rhsa-2025:3131
Vulnerability from csaf_redhat
Published
2025-03-26 17:39
Modified
2025-11-11 20:39
Summary
Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.1.4
Notes
Topic
Logging for Red Hat OpenShift - 6.1.4
Details
Logging for Red Hat OpenShift - 6.1.4
logging-loki-container: Non-linear parsing of case-insensitive content in golang.org/x/net/html (CVE-2024-45338 )
cluster-logging-operator-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
lokistack-gateway-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
opa-openshift-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
lokistack-gateway-container: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Logging for Red Hat OpenShift - 6.1.4",
"title": "Topic"
},
{
"category": "general",
"text": "Logging for Red Hat OpenShift - 6.1.4\nlogging-loki-container: Non-linear parsing of case-insensitive content in golang.org/x/net/html (CVE-2024-45338 )\ncluster-logging-operator-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\nlokistack-gateway-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\nopa-openshift-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\nlokistack-gateway-container: Go JOSE\u0027s Parsing Vulnerable to Denial of Service (CVE-2025-27144)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:3131",
"url": "https://access.redhat.com/errata/RHSA-2025:3131"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2333122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333122"
},
{
"category": "external",
"summary": "2341751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751"
},
{
"category": "external",
"summary": "2347423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347423"
},
{
"category": "external",
"summary": "LOG-6623",
"url": "https://issues.redhat.com/browse/LOG-6623"
},
{
"category": "external",
"summary": "LOG-6797",
"url": "https://issues.redhat.com/browse/LOG-6797"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3131.json"
}
],
"title": "Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.1.4",
"tracking": {
"current_release_date": "2025-11-11T20:39:16+00:00",
"generator": {
"date": "2025-11-11T20:39:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:3131",
"initial_release_date": "2025-03-26T17:39:24+00:00",
"revision_history": [
{
"date": "2025-03-26T17:39:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-03-26T17:39:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-11T20:39:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHOL 6.1 for RHEL 9",
"product": {
"name": "RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:6.1::el9"
}
}
}
],
"category": "product_family",
"name": "logging for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"product": {
"name": "openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"product_id": "openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator\u0026tag=v6.1.4-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9\u0026tag=v1.1.0-337"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"product": {
"name": "openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"product_id": "openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel9\u0026tag=v0.4.0-356"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"product": {
"name": "openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"product_id": "openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel9\u0026tag=v3.4.2-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64",
"product": {
"name": "openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64",
"product_id": "openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel9\u0026tag=v0.37.1-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"product": {
"name": "openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"product_id": "openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel9-operator\u0026tag=v6.1.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"product_id": "openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel9\u0026tag=v0.1.0-752"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"product": {
"name": "openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"product_id": "openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel9\u0026tag=v0.1.0-369"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"product": {
"name": "openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"product_id": "openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator\u0026tag=v6.1.4-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"product_id": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9\u0026tag=v1.1.0-337"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"product": {
"name": "openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"product_id": "openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel9\u0026tag=v0.4.0-356"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"product": {
"name": "openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"product_id": "openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel9\u0026tag=v3.4.2-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"product": {
"name": "openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"product_id": "openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel9\u0026tag=v0.37.1-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"product": {
"name": "openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"product_id": "openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel9-operator\u0026tag=v6.1.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"product_id": "openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel9\u0026tag=v0.1.0-752"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"product": {
"name": "openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"product_id": "openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel9\u0026tag=v0.1.0-369"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"product": {
"name": "openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"product_id": "openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator\u0026tag=v6.1.4-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"product": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v6.1.4-10"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"product_id": "openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9\u0026tag=v1.1.0-337"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"product": {
"name": "openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"product_id": "openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel9\u0026tag=v0.4.0-356"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"product": {
"name": "openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"product_id": "openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel9\u0026tag=v3.4.2-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"product": {
"name": "openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"product_id": "openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel9\u0026tag=v0.37.1-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"product": {
"name": "openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"product_id": "openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-operator-bundle\u0026tag=v6.1.4-13"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"product": {
"name": "openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"product_id": "openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel9-operator\u0026tag=v6.1.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"product_id": "openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel9\u0026tag=v0.1.0-752"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"product": {
"name": "openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"product_id": "openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel9\u0026tag=v0.1.0-369"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"product": {
"name": "openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"product_id": "openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator\u0026tag=v6.1.4-5"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"product": {
"name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"product_id": "openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9\u0026tag=v1.1.0-337"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"product": {
"name": "openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"product_id": "openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel9\u0026tag=v0.4.0-356"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"product": {
"name": "openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"product_id": "openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel9\u0026tag=v3.4.2-6"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"product": {
"name": "openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"product_id": "openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel9\u0026tag=v0.37.1-34"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"product": {
"name": "openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"product_id": "openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel9-operator\u0026tag=v6.1.4-7"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"product": {
"name": "openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"product_id": "openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel9\u0026tag=v0.1.0-752"
}
}
},
{
"category": "product_version",
"name": "openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"product": {
"name": "openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"product_id": "openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel9\u0026tag=v0.1.0-369"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64"
},
"product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64"
},
"product_reference": "openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64"
},
"product_reference": "openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le"
},
"product_reference": "openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x"
},
"product_reference": "openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64"
},
"product_reference": "openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x"
},
"product_reference": "openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le"
},
"product_reference": "openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64"
},
"product_reference": "openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x"
},
"product_reference": "openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64"
},
"product_reference": "openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le"
},
"product_reference": "openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x"
},
"product_reference": "openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64"
},
"product_reference": "openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64"
},
"product_reference": "openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le"
},
"product_reference": "openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64"
},
"product_reference": "openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64"
},
"product_reference": "openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x"
},
"product_reference": "openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le"
},
"product_reference": "openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le"
},
"product_reference": "openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64"
},
"product_reference": "openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64"
},
"product_reference": "openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x"
},
"product_reference": "openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le"
},
"product_reference": "openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x"
},
"product_reference": "openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64"
},
"product_reference": "openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"relates_to_product_reference": "9Base-RHOL-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64 as a component of RHOL 6.1 for RHEL 9",
"product_id": "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64"
},
"product_reference": "openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64",
"relates_to_product_reference": "9Base-RHOL-6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-45336",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-01-23T12:57:38.123000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2341751"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45336"
},
{
"category": "external",
"summary": "RHBZ#2341751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336"
}
],
"release_date": "2025-01-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-03-26T17:39:24+00:00",
"details": "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.17/release_notes/ocp-4-17-release-notes.html\n\nFor Red Hat OpenShift Logging 6.1, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.17/observability/logging/logging-6.1/log6x-upgrading-to-6.html",
"product_ids": [
"9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3131"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect"
},
{
"cve": "CVE-2024-45338",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-12-18T21:00:59.938173+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333122"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang.org/x/net/html. This flaw allows an attacker to craft input to the parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This issue can cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as an Important severity because an attacker can craft malicious input that causes the parsing functions to process data non-linearly, resulting in significant delays which leads to a denial of service by exhausting system resources.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "RHBZ#2333122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338"
},
{
"category": "external",
"summary": "https://go.dev/cl/637536",
"url": "https://go.dev/cl/637536"
},
{
"category": "external",
"summary": "https://go.dev/issue/70906",
"url": "https://go.dev/issue/70906"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ",
"url": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3333",
"url": "https://pkg.go.dev/vuln/GO-2024-3333"
}
],
"release_date": "2024-12-18T20:38:22.660000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-03-26T17:39:24+00:00",
"details": "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.17/release_notes/ocp-4-17-release-notes.html\n\nFor Red Hat OpenShift Logging 6.1, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.17/observability/logging/logging-6.1/log6x-upgrading-to-6.html",
"product_ids": [
"9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3131"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html"
},
{
"cve": "CVE-2025-27144",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-02-24T23:00:42.448432+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347423"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GO-JOSE. In affected versions, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code uses strings.Split(token, \".\") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. This issue could be exploied by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "go-jose: Go JOSE\u0027s Parsing Vulnerable to Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-770: Allocation of Resources Without Limits or Throttling vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect excessive resource usage caused by malicious activity or system misconfigurations. In the event of exploitation, process isolation ensures workloads operate in separate environments, preventing any single process from overconsuming CPU or memory and degrading system performance.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-27144"
},
{
"category": "external",
"summary": "RHBZ#2347423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347423"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-27144",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27144"
},
{
"category": "external",
"summary": "https://github.com/go-jose/go-jose/commit/99b346cec4e86d102284642c5dcbe9bb0cacfc22",
"url": "https://github.com/go-jose/go-jose/commit/99b346cec4e86d102284642c5dcbe9bb0cacfc22"
},
{
"category": "external",
"summary": "https://github.com/go-jose/go-jose/releases/tag/v4.0.5",
"url": "https://github.com/go-jose/go-jose/releases/tag/v4.0.5"
},
{
"category": "external",
"summary": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c6gw-w398-hv78",
"url": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c6gw-w398-hv78"
}
],
"release_date": "2025-02-24T22:22:22.863000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-03-26T17:39:24+00:00",
"details": "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.17/release_notes/ocp-4-17-release-notes.html\n\nFor Red Hat OpenShift Logging 6.1, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.17/observability/logging/logging-6.1/log6x-upgrading-to-6.html",
"product_ids": [
"9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3131"
},
{
"category": "workaround",
"details": "As a workaround, applications can pre-validate that payloads being passed to Go JOSE do not contain an excessive number of `.` characters.",
"product_ids": [
"9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le",
"9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le",
"9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le",
"9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x",
"9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64",
"9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64",
"9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64",
"9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64",
"9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "go-jose: Go JOSE\u0027s Parsing Vulnerable to Denial of Service"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…