rhba-2024_0599
Vulnerability from csaf_redhat
Published
2024-01-30 13:46
Modified
2025-01-04 00:12
Summary
Red Hat Bug Fix Advisory: Migration Toolkit for Applications bug fix and enhancement update

Notes

Topic
Migration Toolkit for Applications 7.0.0 release
Details
Migration Toolkit for Applications 7.0.0 Images
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Migration Toolkit for Applications 7.0.0 release",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Migration Toolkit for Applications 7.0.0 Images",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2024:0599",
        "url": "https://access.redhat.com/errata/RHBA-2024:0599"
      },
      {
        "category": "external",
        "summary": "MTA-1014",
        "url": "https://issues.redhat.com/browse/MTA-1014"
      },
      {
        "category": "external",
        "summary": "MTA-1019",
        "url": "https://issues.redhat.com/browse/MTA-1019"
      },
      {
        "category": "external",
        "summary": "MTA-1024",
        "url": "https://issues.redhat.com/browse/MTA-1024"
      },
      {
        "category": "external",
        "summary": "MTA-1047",
        "url": "https://issues.redhat.com/browse/MTA-1047"
      },
      {
        "category": "external",
        "summary": "MTA-1130",
        "url": "https://issues.redhat.com/browse/MTA-1130"
      },
      {
        "category": "external",
        "summary": "MTA-1155",
        "url": "https://issues.redhat.com/browse/MTA-1155"
      },
      {
        "category": "external",
        "summary": "MTA-1175",
        "url": "https://issues.redhat.com/browse/MTA-1175"
      },
      {
        "category": "external",
        "summary": "MTA-1183",
        "url": "https://issues.redhat.com/browse/MTA-1183"
      },
      {
        "category": "external",
        "summary": "MTA-1185",
        "url": "https://issues.redhat.com/browse/MTA-1185"
      },
      {
        "category": "external",
        "summary": "MTA-1195",
        "url": "https://issues.redhat.com/browse/MTA-1195"
      },
      {
        "category": "external",
        "summary": "MTA-1196",
        "url": "https://issues.redhat.com/browse/MTA-1196"
      },
      {
        "category": "external",
        "summary": "MTA-1197",
        "url": "https://issues.redhat.com/browse/MTA-1197"
      },
      {
        "category": "external",
        "summary": "MTA-1203",
        "url": "https://issues.redhat.com/browse/MTA-1203"
      },
      {
        "category": "external",
        "summary": "MTA-1207",
        "url": "https://issues.redhat.com/browse/MTA-1207"
      },
      {
        "category": "external",
        "summary": "MTA-1247",
        "url": "https://issues.redhat.com/browse/MTA-1247"
      },
      {
        "category": "external",
        "summary": "MTA-1249",
        "url": "https://issues.redhat.com/browse/MTA-1249"
      },
      {
        "category": "external",
        "summary": "MTA-1250",
        "url": "https://issues.redhat.com/browse/MTA-1250"
      },
      {
        "category": "external",
        "summary": "MTA-1251",
        "url": "https://issues.redhat.com/browse/MTA-1251"
      },
      {
        "category": "external",
        "summary": "MTA-1252",
        "url": "https://issues.redhat.com/browse/MTA-1252"
      },
      {
        "category": "external",
        "summary": "MTA-1256",
        "url": "https://issues.redhat.com/browse/MTA-1256"
      },
      {
        "category": "external",
        "summary": "MTA-1258",
        "url": "https://issues.redhat.com/browse/MTA-1258"
      },
      {
        "category": "external",
        "summary": "MTA-1259",
        "url": "https://issues.redhat.com/browse/MTA-1259"
      },
      {
        "category": "external",
        "summary": "MTA-1262",
        "url": "https://issues.redhat.com/browse/MTA-1262"
      },
      {
        "category": "external",
        "summary": "MTA-1263",
        "url": "https://issues.redhat.com/browse/MTA-1263"
      },
      {
        "category": "external",
        "summary": "MTA-1264",
        "url": "https://issues.redhat.com/browse/MTA-1264"
      },
      {
        "category": "external",
        "summary": "MTA-1266",
        "url": "https://issues.redhat.com/browse/MTA-1266"
      },
      {
        "category": "external",
        "summary": "MTA-1268",
        "url": "https://issues.redhat.com/browse/MTA-1268"
      },
      {
        "category": "external",
        "summary": "MTA-1269",
        "url": "https://issues.redhat.com/browse/MTA-1269"
      },
      {
        "category": "external",
        "summary": "MTA-1271",
        "url": "https://issues.redhat.com/browse/MTA-1271"
      },
      {
        "category": "external",
        "summary": "MTA-1279",
        "url": "https://issues.redhat.com/browse/MTA-1279"
      },
      {
        "category": "external",
        "summary": "MTA-1281",
        "url": "https://issues.redhat.com/browse/MTA-1281"
      },
      {
        "category": "external",
        "summary": "MTA-1283",
        "url": "https://issues.redhat.com/browse/MTA-1283"
      },
      {
        "category": "external",
        "summary": "MTA-1284",
        "url": "https://issues.redhat.com/browse/MTA-1284"
      },
      {
        "category": "external",
        "summary": "MTA-1286",
        "url": "https://issues.redhat.com/browse/MTA-1286"
      },
      {
        "category": "external",
        "summary": "MTA-1288",
        "url": "https://issues.redhat.com/browse/MTA-1288"
      },
      {
        "category": "external",
        "summary": "MTA-1292",
        "url": "https://issues.redhat.com/browse/MTA-1292"
      },
      {
        "category": "external",
        "summary": "MTA-1293",
        "url": "https://issues.redhat.com/browse/MTA-1293"
      },
      {
        "category": "external",
        "summary": "MTA-1294",
        "url": "https://issues.redhat.com/browse/MTA-1294"
      },
      {
        "category": "external",
        "summary": "MTA-1295",
        "url": "https://issues.redhat.com/browse/MTA-1295"
      },
      {
        "category": "external",
        "summary": "MTA-1296",
        "url": "https://issues.redhat.com/browse/MTA-1296"
      },
      {
        "category": "external",
        "summary": "MTA-1297",
        "url": "https://issues.redhat.com/browse/MTA-1297"
      },
      {
        "category": "external",
        "summary": "MTA-1298",
        "url": "https://issues.redhat.com/browse/MTA-1298"
      },
      {
        "category": "external",
        "summary": "MTA-1299",
        "url": "https://issues.redhat.com/browse/MTA-1299"
      },
      {
        "category": "external",
        "summary": "MTA-1300",
        "url": "https://issues.redhat.com/browse/MTA-1300"
      },
      {
        "category": "external",
        "summary": "MTA-1302",
        "url": "https://issues.redhat.com/browse/MTA-1302"
      },
      {
        "category": "external",
        "summary": "MTA-1303",
        "url": "https://issues.redhat.com/browse/MTA-1303"
      },
      {
        "category": "external",
        "summary": "MTA-1304",
        "url": "https://issues.redhat.com/browse/MTA-1304"
      },
      {
        "category": "external",
        "summary": "MTA-1305",
        "url": "https://issues.redhat.com/browse/MTA-1305"
      },
      {
        "category": "external",
        "summary": "MTA-1306",
        "url": "https://issues.redhat.com/browse/MTA-1306"
      },
      {
        "category": "external",
        "summary": "MTA-1307",
        "url": "https://issues.redhat.com/browse/MTA-1307"
      },
      {
        "category": "external",
        "summary": "MTA-1309",
        "url": "https://issues.redhat.com/browse/MTA-1309"
      },
      {
        "category": "external",
        "summary": "MTA-1310",
        "url": "https://issues.redhat.com/browse/MTA-1310"
      },
      {
        "category": "external",
        "summary": "MTA-1311",
        "url": "https://issues.redhat.com/browse/MTA-1311"
      },
      {
        "category": "external",
        "summary": "MTA-1312",
        "url": "https://issues.redhat.com/browse/MTA-1312"
      },
      {
        "category": "external",
        "summary": "MTA-1314",
        "url": "https://issues.redhat.com/browse/MTA-1314"
      },
      {
        "category": "external",
        "summary": "MTA-1315",
        "url": "https://issues.redhat.com/browse/MTA-1315"
      },
      {
        "category": "external",
        "summary": "MTA-1316",
        "url": "https://issues.redhat.com/browse/MTA-1316"
      },
      {
        "category": "external",
        "summary": "MTA-1317",
        "url": "https://issues.redhat.com/browse/MTA-1317"
      },
      {
        "category": "external",
        "summary": "MTA-1320",
        "url": "https://issues.redhat.com/browse/MTA-1320"
      },
      {
        "category": "external",
        "summary": "MTA-1322",
        "url": "https://issues.redhat.com/browse/MTA-1322"
      },
      {
        "category": "external",
        "summary": "MTA-1323",
        "url": "https://issues.redhat.com/browse/MTA-1323"
      },
      {
        "category": "external",
        "summary": "MTA-1324",
        "url": "https://issues.redhat.com/browse/MTA-1324"
      },
      {
        "category": "external",
        "summary": "MTA-1326",
        "url": "https://issues.redhat.com/browse/MTA-1326"
      },
      {
        "category": "external",
        "summary": "MTA-1327",
        "url": "https://issues.redhat.com/browse/MTA-1327"
      },
      {
        "category": "external",
        "summary": "MTA-1328",
        "url": "https://issues.redhat.com/browse/MTA-1328"
      },
      {
        "category": "external",
        "summary": "MTA-1329",
        "url": "https://issues.redhat.com/browse/MTA-1329"
      },
      {
        "category": "external",
        "summary": "MTA-1330",
        "url": "https://issues.redhat.com/browse/MTA-1330"
      },
      {
        "category": "external",
        "summary": "MTA-1333",
        "url": "https://issues.redhat.com/browse/MTA-1333"
      },
      {
        "category": "external",
        "summary": "MTA-1334",
        "url": "https://issues.redhat.com/browse/MTA-1334"
      },
      {
        "category": "external",
        "summary": "MTA-1337",
        "url": "https://issues.redhat.com/browse/MTA-1337"
      },
      {
        "category": "external",
        "summary": "MTA-1338",
        "url": "https://issues.redhat.com/browse/MTA-1338"
      },
      {
        "category": "external",
        "summary": "MTA-1339",
        "url": "https://issues.redhat.com/browse/MTA-1339"
      },
      {
        "category": "external",
        "summary": "MTA-1340",
        "url": "https://issues.redhat.com/browse/MTA-1340"
      },
      {
        "category": "external",
        "summary": "MTA-1341",
        "url": "https://issues.redhat.com/browse/MTA-1341"
      },
      {
        "category": "external",
        "summary": "MTA-1343",
        "url": "https://issues.redhat.com/browse/MTA-1343"
      },
      {
        "category": "external",
        "summary": "MTA-1344",
        "url": "https://issues.redhat.com/browse/MTA-1344"
      },
      {
        "category": "external",
        "summary": "MTA-1345",
        "url": "https://issues.redhat.com/browse/MTA-1345"
      },
      {
        "category": "external",
        "summary": "MTA-1346",
        "url": "https://issues.redhat.com/browse/MTA-1346"
      },
      {
        "category": "external",
        "summary": "MTA-1347",
        "url": "https://issues.redhat.com/browse/MTA-1347"
      },
      {
        "category": "external",
        "summary": "MTA-1348",
        "url": "https://issues.redhat.com/browse/MTA-1348"
      },
      {
        "category": "external",
        "summary": "MTA-1349",
        "url": "https://issues.redhat.com/browse/MTA-1349"
      },
      {
        "category": "external",
        "summary": "MTA-1350",
        "url": "https://issues.redhat.com/browse/MTA-1350"
      },
      {
        "category": "external",
        "summary": "MTA-1351",
        "url": "https://issues.redhat.com/browse/MTA-1351"
      },
      {
        "category": "external",
        "summary": "MTA-1362",
        "url": "https://issues.redhat.com/browse/MTA-1362"
      },
      {
        "category": "external",
        "summary": "MTA-1364",
        "url": "https://issues.redhat.com/browse/MTA-1364"
      },
      {
        "category": "external",
        "summary": "MTA-1366",
        "url": "https://issues.redhat.com/browse/MTA-1366"
      },
      {
        "category": "external",
        "summary": "MTA-1367",
        "url": "https://issues.redhat.com/browse/MTA-1367"
      },
      {
        "category": "external",
        "summary": "MTA-1368",
        "url": "https://issues.redhat.com/browse/MTA-1368"
      },
      {
        "category": "external",
        "summary": "MTA-1369",
        "url": "https://issues.redhat.com/browse/MTA-1369"
      },
      {
        "category": "external",
        "summary": "MTA-1377",
        "url": "https://issues.redhat.com/browse/MTA-1377"
      },
      {
        "category": "external",
        "summary": "MTA-1378",
        "url": "https://issues.redhat.com/browse/MTA-1378"
      },
      {
        "category": "external",
        "summary": "MTA-1379",
        "url": "https://issues.redhat.com/browse/MTA-1379"
      },
      {
        "category": "external",
        "summary": "MTA-1381",
        "url": "https://issues.redhat.com/browse/MTA-1381"
      },
      {
        "category": "external",
        "summary": "MTA-1382",
        "url": "https://issues.redhat.com/browse/MTA-1382"
      },
      {
        "category": "external",
        "summary": "MTA-1383",
        "url": "https://issues.redhat.com/browse/MTA-1383"
      },
      {
        "category": "external",
        "summary": "MTA-1384",
        "url": "https://issues.redhat.com/browse/MTA-1384"
      },
      {
        "category": "external",
        "summary": "MTA-1385",
        "url": "https://issues.redhat.com/browse/MTA-1385"
      },
      {
        "category": "external",
        "summary": "MTA-1386",
        "url": "https://issues.redhat.com/browse/MTA-1386"
      },
      {
        "category": "external",
        "summary": "MTA-1387",
        "url": "https://issues.redhat.com/browse/MTA-1387"
      },
      {
        "category": "external",
        "summary": "MTA-1389",
        "url": "https://issues.redhat.com/browse/MTA-1389"
      },
      {
        "category": "external",
        "summary": "MTA-1391",
        "url": "https://issues.redhat.com/browse/MTA-1391"
      },
      {
        "category": "external",
        "summary": "MTA-1393",
        "url": "https://issues.redhat.com/browse/MTA-1393"
      },
      {
        "category": "external",
        "summary": "MTA-1394",
        "url": "https://issues.redhat.com/browse/MTA-1394"
      },
      {
        "category": "external",
        "summary": "MTA-1396",
        "url": "https://issues.redhat.com/browse/MTA-1396"
      },
      {
        "category": "external",
        "summary": "MTA-1397",
        "url": "https://issues.redhat.com/browse/MTA-1397"
      },
      {
        "category": "external",
        "summary": "MTA-1402",
        "url": "https://issues.redhat.com/browse/MTA-1402"
      },
      {
        "category": "external",
        "summary": "MTA-1405",
        "url": "https://issues.redhat.com/browse/MTA-1405"
      },
      {
        "category": "external",
        "summary": "MTA-1407",
        "url": "https://issues.redhat.com/browse/MTA-1407"
      },
      {
        "category": "external",
        "summary": "MTA-1419",
        "url": "https://issues.redhat.com/browse/MTA-1419"
      },
      {
        "category": "external",
        "summary": "MTA-1420",
        "url": "https://issues.redhat.com/browse/MTA-1420"
      },
      {
        "category": "external",
        "summary": "MTA-1422",
        "url": "https://issues.redhat.com/browse/MTA-1422"
      },
      {
        "category": "external",
        "summary": "MTA-1423",
        "url": "https://issues.redhat.com/browse/MTA-1423"
      },
      {
        "category": "external",
        "summary": "MTA-1424",
        "url": "https://issues.redhat.com/browse/MTA-1424"
      },
      {
        "category": "external",
        "summary": "MTA-1425",
        "url": "https://issues.redhat.com/browse/MTA-1425"
      },
      {
        "category": "external",
        "summary": "MTA-1426",
        "url": "https://issues.redhat.com/browse/MTA-1426"
      },
      {
        "category": "external",
        "summary": "MTA-1432",
        "url": "https://issues.redhat.com/browse/MTA-1432"
      },
      {
        "category": "external",
        "summary": "MTA-1434",
        "url": "https://issues.redhat.com/browse/MTA-1434"
      },
      {
        "category": "external",
        "summary": "MTA-1437",
        "url": "https://issues.redhat.com/browse/MTA-1437"
      },
      {
        "category": "external",
        "summary": "MTA-1438",
        "url": "https://issues.redhat.com/browse/MTA-1438"
      },
      {
        "category": "external",
        "summary": "MTA-1449",
        "url": "https://issues.redhat.com/browse/MTA-1449"
      },
      {
        "category": "external",
        "summary": "MTA-1450",
        "url": "https://issues.redhat.com/browse/MTA-1450"
      },
      {
        "category": "external",
        "summary": "MTA-1451",
        "url": "https://issues.redhat.com/browse/MTA-1451"
      },
      {
        "category": "external",
        "summary": "MTA-1452",
        "url": "https://issues.redhat.com/browse/MTA-1452"
      },
      {
        "category": "external",
        "summary": "MTA-1453",
        "url": "https://issues.redhat.com/browse/MTA-1453"
      },
      {
        "category": "external",
        "summary": "MTA-1455",
        "url": "https://issues.redhat.com/browse/MTA-1455"
      },
      {
        "category": "external",
        "summary": "MTA-1456",
        "url": "https://issues.redhat.com/browse/MTA-1456"
      },
      {
        "category": "external",
        "summary": "MTA-1458",
        "url": "https://issues.redhat.com/browse/MTA-1458"
      },
      {
        "category": "external",
        "summary": "MTA-1459",
        "url": "https://issues.redhat.com/browse/MTA-1459"
      },
      {
        "category": "external",
        "summary": "MTA-1465",
        "url": "https://issues.redhat.com/browse/MTA-1465"
      },
      {
        "category": "external",
        "summary": "MTA-1466",
        "url": "https://issues.redhat.com/browse/MTA-1466"
      },
      {
        "category": "external",
        "summary": "MTA-1467",
        "url": "https://issues.redhat.com/browse/MTA-1467"
      },
      {
        "category": "external",
        "summary": "MTA-1476",
        "url": "https://issues.redhat.com/browse/MTA-1476"
      },
      {
        "category": "external",
        "summary": "MTA-1477",
        "url": "https://issues.redhat.com/browse/MTA-1477"
      },
      {
        "category": "external",
        "summary": "MTA-1487",
        "url": "https://issues.redhat.com/browse/MTA-1487"
      },
      {
        "category": "external",
        "summary": "MTA-1489",
        "url": "https://issues.redhat.com/browse/MTA-1489"
      },
      {
        "category": "external",
        "summary": "MTA-1504",
        "url": "https://issues.redhat.com/browse/MTA-1504"
      },
      {
        "category": "external",
        "summary": "MTA-1505",
        "url": "https://issues.redhat.com/browse/MTA-1505"
      },
      {
        "category": "external",
        "summary": "MTA-1506",
        "url": "https://issues.redhat.com/browse/MTA-1506"
      },
      {
        "category": "external",
        "summary": "MTA-1532",
        "url": "https://issues.redhat.com/browse/MTA-1532"
      },
      {
        "category": "external",
        "summary": "MTA-1542",
        "url": "https://issues.redhat.com/browse/MTA-1542"
      },
      {
        "category": "external",
        "summary": "MTA-1543",
        "url": "https://issues.redhat.com/browse/MTA-1543"
      },
      {
        "category": "external",
        "summary": "MTA-1545",
        "url": "https://issues.redhat.com/browse/MTA-1545"
      },
      {
        "category": "external",
        "summary": "MTA-1576",
        "url": "https://issues.redhat.com/browse/MTA-1576"
      },
      {
        "category": "external",
        "summary": "MTA-1584",
        "url": "https://issues.redhat.com/browse/MTA-1584"
      },
      {
        "category": "external",
        "summary": "MTA-1585",
        "url": "https://issues.redhat.com/browse/MTA-1585"
      },
      {
        "category": "external",
        "summary": "MTA-1592",
        "url": "https://issues.redhat.com/browse/MTA-1592"
      },
      {
        "category": "external",
        "summary": "MTA-1598",
        "url": "https://issues.redhat.com/browse/MTA-1598"
      },
      {
        "category": "external",
        "summary": "MTA-1599",
        "url": "https://issues.redhat.com/browse/MTA-1599"
      },
      {
        "category": "external",
        "summary": "MTA-1600",
        "url": "https://issues.redhat.com/browse/MTA-1600"
      },
      {
        "category": "external",
        "summary": "MTA-1605",
        "url": "https://issues.redhat.com/browse/MTA-1605"
      },
      {
        "category": "external",
        "summary": "MTA-1606",
        "url": "https://issues.redhat.com/browse/MTA-1606"
      },
      {
        "category": "external",
        "summary": "MTA-1611",
        "url": "https://issues.redhat.com/browse/MTA-1611"
      },
      {
        "category": "external",
        "summary": "MTA-1621",
        "url": "https://issues.redhat.com/browse/MTA-1621"
      },
      {
        "category": "external",
        "summary": "MTA-1622",
        "url": "https://issues.redhat.com/browse/MTA-1622"
      },
      {
        "category": "external",
        "summary": "MTA-1625",
        "url": "https://issues.redhat.com/browse/MTA-1625"
      },
      {
        "category": "external",
        "summary": "MTA-1627",
        "url": "https://issues.redhat.com/browse/MTA-1627"
      },
      {
        "category": "external",
        "summary": "MTA-1628",
        "url": "https://issues.redhat.com/browse/MTA-1628"
      },
      {
        "category": "external",
        "summary": "MTA-1629",
        "url": "https://issues.redhat.com/browse/MTA-1629"
      },
      {
        "category": "external",
        "summary": "MTA-1640",
        "url": "https://issues.redhat.com/browse/MTA-1640"
      },
      {
        "category": "external",
        "summary": "MTA-1644",
        "url": "https://issues.redhat.com/browse/MTA-1644"
      },
      {
        "category": "external",
        "summary": "MTA-1645",
        "url": "https://issues.redhat.com/browse/MTA-1645"
      },
      {
        "category": "external",
        "summary": "MTA-1647",
        "url": "https://issues.redhat.com/browse/MTA-1647"
      },
      {
        "category": "external",
        "summary": "MTA-1649",
        "url": "https://issues.redhat.com/browse/MTA-1649"
      },
      {
        "category": "external",
        "summary": "MTA-1651",
        "url": "https://issues.redhat.com/browse/MTA-1651"
      },
      {
        "category": "external",
        "summary": "MTA-1654",
        "url": "https://issues.redhat.com/browse/MTA-1654"
      },
      {
        "category": "external",
        "summary": "MTA-1661",
        "url": "https://issues.redhat.com/browse/MTA-1661"
      },
      {
        "category": "external",
        "summary": "MTA-1664",
        "url": "https://issues.redhat.com/browse/MTA-1664"
      },
      {
        "category": "external",
        "summary": "MTA-1673",
        "url": "https://issues.redhat.com/browse/MTA-1673"
      },
      {
        "category": "external",
        "summary": "MTA-1674",
        "url": "https://issues.redhat.com/browse/MTA-1674"
      },
      {
        "category": "external",
        "summary": "MTA-1675",
        "url": "https://issues.redhat.com/browse/MTA-1675"
      },
      {
        "category": "external",
        "summary": "MTA-1676",
        "url": "https://issues.redhat.com/browse/MTA-1676"
      },
      {
        "category": "external",
        "summary": "MTA-1677",
        "url": "https://issues.redhat.com/browse/MTA-1677"
      },
      {
        "category": "external",
        "summary": "MTA-1678",
        "url": "https://issues.redhat.com/browse/MTA-1678"
      },
      {
        "category": "external",
        "summary": "MTA-1679",
        "url": "https://issues.redhat.com/browse/MTA-1679"
      },
      {
        "category": "external",
        "summary": "MTA-1680",
        "url": "https://issues.redhat.com/browse/MTA-1680"
      },
      {
        "category": "external",
        "summary": "MTA-1687",
        "url": "https://issues.redhat.com/browse/MTA-1687"
      },
      {
        "category": "external",
        "summary": "MTA-1693",
        "url": "https://issues.redhat.com/browse/MTA-1693"
      },
      {
        "category": "external",
        "summary": "MTA-1694",
        "url": "https://issues.redhat.com/browse/MTA-1694"
      },
      {
        "category": "external",
        "summary": "MTA-1711",
        "url": "https://issues.redhat.com/browse/MTA-1711"
      },
      {
        "category": "external",
        "summary": "MTA-1714",
        "url": "https://issues.redhat.com/browse/MTA-1714"
      },
      {
        "category": "external",
        "summary": "MTA-1715",
        "url": "https://issues.redhat.com/browse/MTA-1715"
      },
      {
        "category": "external",
        "summary": "MTA-1716",
        "url": "https://issues.redhat.com/browse/MTA-1716"
      },
      {
        "category": "external",
        "summary": "MTA-1717",
        "url": "https://issues.redhat.com/browse/MTA-1717"
      },
      {
        "category": "external",
        "summary": "MTA-1719",
        "url": "https://issues.redhat.com/browse/MTA-1719"
      },
      {
        "category": "external",
        "summary": "MTA-1720",
        "url": "https://issues.redhat.com/browse/MTA-1720"
      },
      {
        "category": "external",
        "summary": "MTA-1722",
        "url": "https://issues.redhat.com/browse/MTA-1722"
      },
      {
        "category": "external",
        "summary": "MTA-1723",
        "url": "https://issues.redhat.com/browse/MTA-1723"
      },
      {
        "category": "external",
        "summary": "MTA-1725",
        "url": "https://issues.redhat.com/browse/MTA-1725"
      },
      {
        "category": "external",
        "summary": "MTA-1739",
        "url": "https://issues.redhat.com/browse/MTA-1739"
      },
      {
        "category": "external",
        "summary": "MTA-1740",
        "url": "https://issues.redhat.com/browse/MTA-1740"
      },
      {
        "category": "external",
        "summary": "MTA-1746",
        "url": "https://issues.redhat.com/browse/MTA-1746"
      },
      {
        "category": "external",
        "summary": "MTA-1747",
        "url": "https://issues.redhat.com/browse/MTA-1747"
      },
      {
        "category": "external",
        "summary": "MTA-1749",
        "url": "https://issues.redhat.com/browse/MTA-1749"
      },
      {
        "category": "external",
        "summary": "MTA-1751",
        "url": "https://issues.redhat.com/browse/MTA-1751"
      },
      {
        "category": "external",
        "summary": "MTA-1752",
        "url": "https://issues.redhat.com/browse/MTA-1752"
      },
      {
        "category": "external",
        "summary": "MTA-1753",
        "url": "https://issues.redhat.com/browse/MTA-1753"
      },
      {
        "category": "external",
        "summary": "MTA-1754",
        "url": "https://issues.redhat.com/browse/MTA-1754"
      },
      {
        "category": "external",
        "summary": "MTA-1762",
        "url": "https://issues.redhat.com/browse/MTA-1762"
      },
      {
        "category": "external",
        "summary": "MTA-1779",
        "url": "https://issues.redhat.com/browse/MTA-1779"
      },
      {
        "category": "external",
        "summary": "MTA-1781",
        "url": "https://issues.redhat.com/browse/MTA-1781"
      },
      {
        "category": "external",
        "summary": "MTA-1783",
        "url": "https://issues.redhat.com/browse/MTA-1783"
      },
      {
        "category": "external",
        "summary": "MTA-1787",
        "url": "https://issues.redhat.com/browse/MTA-1787"
      },
      {
        "category": "external",
        "summary": "MTA-1791",
        "url": "https://issues.redhat.com/browse/MTA-1791"
      },
      {
        "category": "external",
        "summary": "MTA-1804",
        "url": "https://issues.redhat.com/browse/MTA-1804"
      },
      {
        "category": "external",
        "summary": "MTA-1805",
        "url": "https://issues.redhat.com/browse/MTA-1805"
      },
      {
        "category": "external",
        "summary": "MTA-1806",
        "url": "https://issues.redhat.com/browse/MTA-1806"
      },
      {
        "category": "external",
        "summary": "MTA-1810",
        "url": "https://issues.redhat.com/browse/MTA-1810"
      },
      {
        "category": "external",
        "summary": "MTA-1812",
        "url": "https://issues.redhat.com/browse/MTA-1812"
      },
      {
        "category": "external",
        "summary": "MTA-1813",
        "url": "https://issues.redhat.com/browse/MTA-1813"
      },
      {
        "category": "external",
        "summary": "MTA-1815",
        "url": "https://issues.redhat.com/browse/MTA-1815"
      },
      {
        "category": "external",
        "summary": "MTA-1826",
        "url": "https://issues.redhat.com/browse/MTA-1826"
      },
      {
        "category": "external",
        "summary": "MTA-1828",
        "url": "https://issues.redhat.com/browse/MTA-1828"
      },
      {
        "category": "external",
        "summary": "MTA-1834",
        "url": "https://issues.redhat.com/browse/MTA-1834"
      },
      {
        "category": "external",
        "summary": "MTA-1835",
        "url": "https://issues.redhat.com/browse/MTA-1835"
      },
      {
        "category": "external",
        "summary": "MTA-1836",
        "url": "https://issues.redhat.com/browse/MTA-1836"
      },
      {
        "category": "external",
        "summary": "MTA-1839",
        "url": "https://issues.redhat.com/browse/MTA-1839"
      },
      {
        "category": "external",
        "summary": "MTA-1840",
        "url": "https://issues.redhat.com/browse/MTA-1840"
      },
      {
        "category": "external",
        "summary": "MTA-1841",
        "url": "https://issues.redhat.com/browse/MTA-1841"
      },
      {
        "category": "external",
        "summary": "MTA-1842",
        "url": "https://issues.redhat.com/browse/MTA-1842"
      },
      {
        "category": "external",
        "summary": "MTA-1843",
        "url": "https://issues.redhat.com/browse/MTA-1843"
      },
      {
        "category": "external",
        "summary": "MTA-1844",
        "url": "https://issues.redhat.com/browse/MTA-1844"
      },
      {
        "category": "external",
        "summary": "MTA-1846",
        "url": "https://issues.redhat.com/browse/MTA-1846"
      },
      {
        "category": "external",
        "summary": "MTA-1858",
        "url": "https://issues.redhat.com/browse/MTA-1858"
      },
      {
        "category": "external",
        "summary": "MTA-1859",
        "url": "https://issues.redhat.com/browse/MTA-1859"
      },
      {
        "category": "external",
        "summary": "MTA-1860",
        "url": "https://issues.redhat.com/browse/MTA-1860"
      },
      {
        "category": "external",
        "summary": "MTA-1867",
        "url": "https://issues.redhat.com/browse/MTA-1867"
      },
      {
        "category": "external",
        "summary": "MTA-1871",
        "url": "https://issues.redhat.com/browse/MTA-1871"
      },
      {
        "category": "external",
        "summary": "MTA-1878",
        "url": "https://issues.redhat.com/browse/MTA-1878"
      },
      {
        "category": "external",
        "summary": "MTA-1879",
        "url": "https://issues.redhat.com/browse/MTA-1879"
      },
      {
        "category": "external",
        "summary": "MTA-1881",
        "url": "https://issues.redhat.com/browse/MTA-1881"
      },
      {
        "category": "external",
        "summary": "MTA-1882",
        "url": "https://issues.redhat.com/browse/MTA-1882"
      },
      {
        "category": "external",
        "summary": "MTA-1883",
        "url": "https://issues.redhat.com/browse/MTA-1883"
      },
      {
        "category": "external",
        "summary": "MTA-1891",
        "url": "https://issues.redhat.com/browse/MTA-1891"
      },
      {
        "category": "external",
        "summary": "MTA-1892",
        "url": "https://issues.redhat.com/browse/MTA-1892"
      },
      {
        "category": "external",
        "summary": "MTA-1893",
        "url": "https://issues.redhat.com/browse/MTA-1893"
      },
      {
        "category": "external",
        "summary": "MTA-1894",
        "url": "https://issues.redhat.com/browse/MTA-1894"
      },
      {
        "category": "external",
        "summary": "MTA-1895",
        "url": "https://issues.redhat.com/browse/MTA-1895"
      },
      {
        "category": "external",
        "summary": "MTA-1900",
        "url": "https://issues.redhat.com/browse/MTA-1900"
      },
      {
        "category": "external",
        "summary": "MTA-1902",
        "url": "https://issues.redhat.com/browse/MTA-1902"
      },
      {
        "category": "external",
        "summary": "MTA-1903",
        "url": "https://issues.redhat.com/browse/MTA-1903"
      },
      {
        "category": "external",
        "summary": "MTA-1905",
        "url": "https://issues.redhat.com/browse/MTA-1905"
      },
      {
        "category": "external",
        "summary": "MTA-1906",
        "url": "https://issues.redhat.com/browse/MTA-1906"
      },
      {
        "category": "external",
        "summary": "MTA-1907",
        "url": "https://issues.redhat.com/browse/MTA-1907"
      },
      {
        "category": "external",
        "summary": "MTA-1908",
        "url": "https://issues.redhat.com/browse/MTA-1908"
      },
      {
        "category": "external",
        "summary": "MTA-1921",
        "url": "https://issues.redhat.com/browse/MTA-1921"
      },
      {
        "category": "external",
        "summary": "MTA-1935",
        "url": "https://issues.redhat.com/browse/MTA-1935"
      },
      {
        "category": "external",
        "summary": "MTA-1940",
        "url": "https://issues.redhat.com/browse/MTA-1940"
      },
      {
        "category": "external",
        "summary": "MTA-1942",
        "url": "https://issues.redhat.com/browse/MTA-1942"
      },
      {
        "category": "external",
        "summary": "MTA-1945",
        "url": "https://issues.redhat.com/browse/MTA-1945"
      },
      {
        "category": "external",
        "summary": "MTA-1947",
        "url": "https://issues.redhat.com/browse/MTA-1947"
      },
      {
        "category": "external",
        "summary": "MTA-1954",
        "url": "https://issues.redhat.com/browse/MTA-1954"
      },
      {
        "category": "external",
        "summary": "MTA-1957",
        "url": "https://issues.redhat.com/browse/MTA-1957"
      },
      {
        "category": "external",
        "summary": "MTA-1966",
        "url": "https://issues.redhat.com/browse/MTA-1966"
      },
      {
        "category": "external",
        "summary": "MTA-1998",
        "url": "https://issues.redhat.com/browse/MTA-1998"
      },
      {
        "category": "external",
        "summary": "MTA-2009",
        "url": "https://issues.redhat.com/browse/MTA-2009"
      },
      {
        "category": "external",
        "summary": "MTA-2042",
        "url": "https://issues.redhat.com/browse/MTA-2042"
      },
      {
        "category": "external",
        "summary": "MTA-2089",
        "url": "https://issues.redhat.com/browse/MTA-2089"
      },
      {
        "category": "external",
        "summary": "MTA-393",
        "url": "https://issues.redhat.com/browse/MTA-393"
      },
      {
        "category": "external",
        "summary": "MTA-466",
        "url": "https://issues.redhat.com/browse/MTA-466"
      },
      {
        "category": "external",
        "summary": "MTA-473",
        "url": "https://issues.redhat.com/browse/MTA-473"
      },
      {
        "category": "external",
        "summary": "MTA-696",
        "url": "https://issues.redhat.com/browse/MTA-696"
      },
      {
        "category": "external",
        "summary": "MTA-701",
        "url": "https://issues.redhat.com/browse/MTA-701"
      },
      {
        "category": "external",
        "summary": "MTA-742",
        "url": "https://issues.redhat.com/browse/MTA-742"
      },
      {
        "category": "external",
        "summary": "MTA-748",
        "url": "https://issues.redhat.com/browse/MTA-748"
      },
      {
        "category": "external",
        "summary": "MTA-810",
        "url": "https://issues.redhat.com/browse/MTA-810"
      },
      {
        "category": "external",
        "summary": "MTA-849",
        "url": "https://issues.redhat.com/browse/MTA-849"
      },
      {
        "category": "external",
        "summary": "MTA-991",
        "url": "https://issues.redhat.com/browse/MTA-991"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhba-2024_0599.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: Migration Toolkit for Applications bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-01-04T00:12:11+00:00",
      "generator": {
        "date": "2025-01-04T00:12:11+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.5"
        }
      },
      "id": "RHBA-2024:0599",
      "initial_release_date": "2024-01-30T13:46:48+00:00",
      "revision_history": [
        {
          "date": "2024-01-30T13:46:48+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-01-30T13:46:48+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-01-04T00:12:11+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MTA 7.0 for RHEL 9",
                "product": {
                  "name": "MTA 7.0 for RHEL 9",
                  "product_id": "9Base-MTA-7.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:migration_toolkit_applications:7.0::el9"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "MTA 7.0 for RHEL 8",
                "product": {
                  "name": "MTA 7.0 for RHEL 8",
                  "product_id": "8Base-MTA-7.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:migration_toolkit_applications:7.0::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Migration Toolkit for Applications"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
                "product": {
                  "name": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
                  "product_id": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-addon-rhel9\u0026tag=7.0.0-36"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
                "product": {
                  "name": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
                  "product_id": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-lsp-rhel9\u0026tag=7.0.0-22"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
                "product": {
                  "name": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
                  "product_id": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-cli-rhel9\u0026tag=7.0.0-44"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
                "product": {
                  "name": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
                  "product_id": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-hub-rhel9\u0026tag=7.0.0-31"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
                "product": {
                  "name": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
                  "product_id": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-operator-bundle\u0026tag=7.0.0-63"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
                "product": {
                  "name": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
                  "product_id": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-rhel8-operator\u0026tag=7.0.0-13"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
                "product": {
                  "name": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
                  "product_id": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-ui-rhel9\u0026tag=7.0.0-25"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64",
                "product": {
                  "name": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64",
                  "product_id": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-windup-shim-rhel9\u0026tag=7.0.0-31"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64 as a component of MTA 7.0 for RHEL 8",
          "product_id": "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64"
        },
        "product_reference": "mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
        "relates_to_product_reference": "8Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64"
        },
        "product_reference": "mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64"
        },
        "product_reference": "mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
        },
        "product_reference": "mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64"
        },
        "product_reference": "mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64"
        },
        "product_reference": "mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64"
        },
        "product_reference": "mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64 as a component of MTA 7.0 for RHEL 9",
          "product_id": "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
        },
        "product_reference": "mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64",
        "relates_to_product_reference": "9Base-MTA-7.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-39325",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-10-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
            "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
            "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
            "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
            "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2243296"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
        ],
        "known_not_affected": [
          "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
          "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
          "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
          "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
          "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
          "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
          "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-39325"
        },
        {
          "category": "external",
          "summary": "RHBZ#2243296",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
        },
        {
          "category": "external",
          "summary": "RHSB-2023-003",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
          "url": "https://access.redhat.com/security/cve/CVE-2023-44487"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/63417",
          "url": "https://go.dev/issue/63417"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-2102",
          "url": "https://pkg.go.dev/vuln/GO-2023-2102"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
          "url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
        }
      ],
      "release_date": "2023-10-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-01-30T13:46:48+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2024:0599"
        },
        {
          "category": "workaround",
          "details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
          "product_ids": [
            "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
            "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
            "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
            "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
            "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
            "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
            "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
            "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
            "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
            "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
            "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
    },
    {
      "cve": "CVE-2023-44487",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-10-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
            "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
            "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
            "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
            "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2242803"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
        ],
        "known_not_affected": [
          "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
          "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
          "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
          "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
          "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
          "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
          "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-44487"
        },
        {
          "category": "external",
          "summary": "RHBZ#2242803",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
        },
        {
          "category": "external",
          "summary": "RHSB-2023-003",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
        },
        {
          "category": "external",
          "summary": "https://github.com/dotnet/announcements/issues/277",
          "url": "https://github.com/dotnet/announcements/issues/277"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-2102",
          "url": "https://pkg.go.dev/vuln/GO-2023-2102"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
          "url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
        },
        {
          "category": "external",
          "summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
          "url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2023-10-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-01-30T13:46:48+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2024:0599"
        },
        {
          "category": "workaround",
          "details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n     a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n     b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n     c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n     d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n     e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
          "product_ids": [
            "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
            "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
            "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
            "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
            "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
            "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:773b71296ffb507938983d8afe563a5a7bd822c940dd3717cec8410c348d86d8_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:cdd94053c042f512f13ccf28b58c66ad2da74edb2f309f7e065ccd55570e5423_amd64",
            "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:5ecb233843ae369e5b7c1acae988e5a19bdc69f232df85abdfc37e921ca10e86_amd64",
            "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:394da54c8b6c523ac67ddb4643483d73c8f5d8246d480a4d326d07ae9ccd0d19_amd64",
            "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:b57ab84961a2ca5e2c67ed4a58d6445698d2fd195290010a2f5adf5928ce9938_amd64",
            "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:323c8ff5f805ffbfdeef1e54208c9bf080564a8baf4b94acf9f4c98e85ebcb22_amd64",
            "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:74f0ab0f8f455ac4ae91e8450db2f7d3b2ce0fbccf51fea06d0444823cd32e9e_amd64",
            "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:7ab7480cf40d5e71ab2b9c94f4f6e37d533209da317c70023bb82abe7216b498_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2023-10-10T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.