Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-12797
Vulnerability from cvelistv5
Published
2025-02-11 15:59
Modified
2025-02-18 14:01
Severity ?
EPSS score ?
Summary
Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a
server may fail to notice that the server was not authenticated, because
handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode
is set.
Impact summary: TLS and DTLS connections using raw public keys may be
vulnerable to man-in-middle attacks when server authentication failure is not
detected by clients.
RPKs are disabled by default in both TLS clients and TLS servers. The issue
only arises when TLS clients explicitly enable RPK use by the server, and the
server, likewise, enables sending of an RPK instead of an X.509 certificate
chain. The affected clients are those that then rely on the handshake to
fail when the server's RPK fails to match one of the expected public keys,
by setting the verification mode to SSL_VERIFY_PEER.
Clients that enable server-side raw public keys can still find out that raw
public key verification failed by calling SSL_get_verify_result(), and those
that do, and take appropriate action, are not affected. This issue was
introduced in the initial implementation of RPK support in OpenSSL 3.2.
The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-02-15T00:10:32.191Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2025/02/11/3" }, { "url": "http://www.openwall.com/lists/oss-security/2025/02/11/4" }, { "url": "https://security.netapp.com/advisory/ntap-20250214-0001/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-12797", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-14T20:24:14.595864Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-18T14:01:55.140Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenSSL", "vendor": "OpenSSL", "versions": [ { "lessThan": "3.4.1", "status": "affected", "version": "3.4.0", "versionType": "semver" }, { "lessThan": "3.3.3", "status": "affected", "version": "3.3.0", "versionType": "semver" }, { "lessThan": "3.2.4", "status": "affected", "version": "3.2.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Apple Inc." }, { "lang": "en", "type": "remediation developer", "value": "Viktor Dukhovni" } ], "datePublic": "2025-02-11T14:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a\u003cbr\u003eserver may fail to notice that the server was not authenticated, because\u003cbr\u003ehandshakes don\u0027t abort as expected when the SSL_VERIFY_PEER verification mode\u003cbr\u003eis set.\u003cbr\u003e\u003cbr\u003eImpact summary: TLS and DTLS connections using raw public keys may be\u003cbr\u003evulnerable to man-in-middle attacks when server authentication failure is not\u003cbr\u003edetected by clients.\u003cbr\u003e\u003cbr\u003eRPKs are disabled by default in both TLS clients and TLS servers. The issue\u003cbr\u003eonly arises when TLS clients explicitly enable RPK use by the server, and the\u003cbr\u003eserver, likewise, enables sending of an RPK instead of an X.509 certificate\u003cbr\u003echain. The affected clients are those that then rely on the handshake to\u003cbr\u003efail when the server\u0027s RPK fails to match one of the expected public keys,\u003cbr\u003eby setting the verification mode to SSL_VERIFY_PEER.\u003cbr\u003e\u003cbr\u003eClients that enable server-side raw public keys can still find out that raw\u003cbr\u003epublic key verification failed by calling SSL_get_verify_result(), and those\u003cbr\u003ethat do, and take appropriate action, are not affected. This issue was\u003cbr\u003eintroduced in the initial implementation of RPK support in OpenSSL 3.2.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue." } ], "value": "Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a\nserver may fail to notice that the server was not authenticated, because\nhandshakes don\u0027t abort as expected when the SSL_VERIFY_PEER verification mode\nis set.\n\nImpact summary: TLS and DTLS connections using raw public keys may be\nvulnerable to man-in-middle attacks when server authentication failure is not\ndetected by clients.\n\nRPKs are disabled by default in both TLS clients and TLS servers. The issue\nonly arises when TLS clients explicitly enable RPK use by the server, and the\nserver, likewise, enables sending of an RPK instead of an X.509 certificate\nchain. The affected clients are those that then rely on the handshake to\nfail when the server\u0027s RPK fails to match one of the expected public keys,\nby setting the verification mode to SSL_VERIFY_PEER.\n\nClients that enable server-side raw public keys can still find out that raw\npublic key verification failed by calling SSL_get_verify_result(), and those\nthat do, and take appropriate action, are not affected. This issue was\nintroduced in the initial implementation of RPK support in OpenSSL 3.2.\n\nThe FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue." } ], "metrics": [ { "format": "other", "other": { "content": { "text": "High" }, "type": "https://openssl-library.org/policies/general/security-policy/" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-392", "description": "CWE-392 Missing Report of Error Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-11T15:59:36.719Z", "orgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "shortName": "openssl" }, "references": [ { "name": "OpenSSL Advisory", "tags": [ "vendor-advisory" ], "url": "https://openssl-library.org/news/secadv/20250211.txt" }, { "name": "3.4.1 git commit", "tags": [ "patch" ], "url": "https://github.com/openssl/openssl/commit/738d4f9fdeaad57660dcba50a619fafced3fd5e9" }, { "name": "3.3.3 git commit", "tags": [ "patch" ], "url": "https://github.com/openssl/openssl/commit/87ebd203feffcf92ad5889df92f90bb0ee10a699" }, { "name": "3.2.4 git commit", "tags": [ "patch" ], "url": "https://github.com/openssl/openssl/commit/798779d43494549b611233f92652f0da5328fbe7" } ], "source": { "discovery": "UNKNOWN" }, "title": "RFC7250 handshakes with unauthenticated servers don\u0027t abort as expected", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "assignerShortName": "openssl", "cveId": "CVE-2024-12797", "datePublished": "2025-02-11T15:59:36.719Z", "dateReserved": "2024-12-19T13:54:37.212Z", "dateUpdated": "2025-02-18T14:01:55.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-12797\",\"sourceIdentifier\":\"openssl-security@openssl.org\",\"published\":\"2025-02-11T16:15:38.827\",\"lastModified\":\"2025-02-18T14:15:27.107\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a\\nserver may fail to notice that the server was not authenticated, because\\nhandshakes don\u0027t abort as expected when the SSL_VERIFY_PEER verification mode\\nis set.\\n\\nImpact summary: TLS and DTLS connections using raw public keys may be\\nvulnerable to man-in-middle attacks when server authentication failure is not\\ndetected by clients.\\n\\nRPKs are disabled by default in both TLS clients and TLS servers. The issue\\nonly arises when TLS clients explicitly enable RPK use by the server, and the\\nserver, likewise, enables sending of an RPK instead of an X.509 certificate\\nchain. The affected clients are those that then rely on the handshake to\\nfail when the server\u0027s RPK fails to match one of the expected public keys,\\nby setting the verification mode to SSL_VERIFY_PEER.\\n\\nClients that enable server-side raw public keys can still find out that raw\\npublic key verification failed by calling SSL_get_verify_result(), and those\\nthat do, and take appropriate action, are not affected. This issue was\\nintroduced in the initial implementation of RPK support in OpenSSL 3.2.\\n\\nThe FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\"},{\"lang\":\"es\",\"value\":\"Resumen del problema: los clientes que utilizan claves p\u00fablicas sin procesar (RPK) RFC7250 para autenticar un servidor pueden no darse cuenta de que el servidor no se ha autenticado, porque los protocolos de enlace no se cancelan como se espera cuando se establece el modo de verificaci\u00f3n SSL_VERIFY_PEER. Resumen del impacto: las conexiones TLS y DTLS que utilizan claves p\u00fablicas sin procesar pueden ser vulnerables a ataques de intermediarios cuando los clientes no detectan un error de autenticaci\u00f3n del servidor. Las RPK est\u00e1n deshabilitadas de forma predeterminada tanto en los clientes TLS como en los servidores TLS. El problema solo surge cuando los clientes TLS habilitan expl\u00edcitamente el uso de RPK por parte del servidor y el servidor, a su vez, habilita el env\u00edo de una RPK en lugar de una cadena de certificados X.509. Los clientes afectados son aquellos que dependen de que el protocolo de enlace falle cuando la RPK del servidor no coincide con una de las claves p\u00fablicas esperadas, al establecer el modo de verificaci\u00f3n en SSL_VERIFY_PEER. Los clientes que habilitan claves p\u00fablicas sin procesar del lado del servidor a\u00fan pueden descubrir que la verificaci\u00f3n de clave p\u00fablica sin procesar fall\u00f3 al llamar a SSL_get_verify_result(), y aquellos que lo hacen y toman las medidas adecuadas no se ven afectados. Este problema se introdujo en la implementaci\u00f3n inicial de la compatibilidad con RPK en OpenSSL 3.2. Los m\u00f3dulos FIPS en 3.4, 3.3, 3.2, 3.1 y 3.0 no se ven afectados por este problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"openssl-security@openssl.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-392\"}]}],\"references\":[{\"url\":\"https://github.com/openssl/openssl/commit/738d4f9fdeaad57660dcba50a619fafced3fd5e9\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://github.com/openssl/openssl/commit/798779d43494549b611233f92652f0da5328fbe7\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://github.com/openssl/openssl/commit/87ebd203feffcf92ad5889df92f90bb0ee10a699\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://openssl-library.org/news/secadv/20250211.txt\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/02/11/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/02/11/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20250214-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/02/11/3\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/02/11/4\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20250214-0001/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-02-15T00:10:32.191Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-12797\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-14T20:24:14.595864Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-14T20:24:52.904Z\"}}], \"cna\": {\"title\": \"RFC7250 handshakes with unauthenticated servers don\u0027t abort as expected\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Apple Inc.\"}, {\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Viktor Dukhovni\"}], \"metrics\": [{\"other\": {\"type\": \"https://openssl-library.org/policies/general/security-policy/\", \"content\": {\"text\": \"High\"}}, \"format\": \"other\"}], \"affected\": [{\"vendor\": \"OpenSSL\", \"product\": \"OpenSSL\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.4.0\", \"lessThan\": \"3.4.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"3.3.0\", \"lessThan\": \"3.3.3\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"3.2.0\", \"lessThan\": \"3.2.4\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2025-02-11T14:00:00.000Z\", \"references\": [{\"url\": \"https://openssl-library.org/news/secadv/20250211.txt\", \"name\": \"OpenSSL Advisory\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://github.com/openssl/openssl/commit/738d4f9fdeaad57660dcba50a619fafced3fd5e9\", \"name\": \"3.4.1 git commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/openssl/openssl/commit/87ebd203feffcf92ad5889df92f90bb0ee10a699\", \"name\": \"3.3.3 git commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/openssl/openssl/commit/798779d43494549b611233f92652f0da5328fbe7\", \"name\": \"3.2.4 git commit\", \"tags\": [\"patch\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a\\nserver may fail to notice that the server was not authenticated, because\\nhandshakes don\u0027t abort as expected when the SSL_VERIFY_PEER verification mode\\nis set.\\n\\nImpact summary: TLS and DTLS connections using raw public keys may be\\nvulnerable to man-in-middle attacks when server authentication failure is not\\ndetected by clients.\\n\\nRPKs are disabled by default in both TLS clients and TLS servers. The issue\\nonly arises when TLS clients explicitly enable RPK use by the server, and the\\nserver, likewise, enables sending of an RPK instead of an X.509 certificate\\nchain. The affected clients are those that then rely on the handshake to\\nfail when the server\u0027s RPK fails to match one of the expected public keys,\\nby setting the verification mode to SSL_VERIFY_PEER.\\n\\nClients that enable server-side raw public keys can still find out that raw\\npublic key verification failed by calling SSL_get_verify_result(), and those\\nthat do, and take appropriate action, are not affected. This issue was\\nintroduced in the initial implementation of RPK support in OpenSSL 3.2.\\n\\nThe FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a\u003cbr\u003eserver may fail to notice that the server was not authenticated, because\u003cbr\u003ehandshakes don\u0027t abort as expected when the SSL_VERIFY_PEER verification mode\u003cbr\u003eis set.\u003cbr\u003e\u003cbr\u003eImpact summary: TLS and DTLS connections using raw public keys may be\u003cbr\u003evulnerable to man-in-middle attacks when server authentication failure is not\u003cbr\u003edetected by clients.\u003cbr\u003e\u003cbr\u003eRPKs are disabled by default in both TLS clients and TLS servers. The issue\u003cbr\u003eonly arises when TLS clients explicitly enable RPK use by the server, and the\u003cbr\u003eserver, likewise, enables sending of an RPK instead of an X.509 certificate\u003cbr\u003echain. The affected clients are those that then rely on the handshake to\u003cbr\u003efail when the server\u0027s RPK fails to match one of the expected public keys,\u003cbr\u003eby setting the verification mode to SSL_VERIFY_PEER.\u003cbr\u003e\u003cbr\u003eClients that enable server-side raw public keys can still find out that raw\u003cbr\u003epublic key verification failed by calling SSL_get_verify_result(), and those\u003cbr\u003ethat do, and take appropriate action, are not affected. This issue was\u003cbr\u003eintroduced in the initial implementation of RPK support in OpenSSL 3.2.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-392\", \"description\": \"CWE-392 Missing Report of Error Condition\"}]}], \"providerMetadata\": {\"orgId\": \"3a12439a-ef3a-4c79-92e6-6081a721f1e5\", \"shortName\": \"openssl\", \"dateUpdated\": \"2025-02-11T15:59:36.719Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-12797\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-18T14:01:55.140Z\", \"dateReserved\": \"2024-12-19T13:54:37.212Z\", \"assignerOrgId\": \"3a12439a-ef3a-4c79-92e6-6081a721f1e5\", \"datePublished\": \"2025-02-11T15:59:36.719Z\", \"assignerShortName\": \"openssl\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
rhsa-2025:1330
Vulnerability from csaf_redhat
Published
2025-02-11 16:50
Modified
2025-02-27 20:08
Summary
Red Hat Security Advisory: openssl security update
Notes
Topic
An update for openssl is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: RFC7250 handshakes with unauthenticated servers don't abort as expected (CVE-2024-12797)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: RFC7250 handshakes with unauthenticated servers don\u0027t abort as expected (CVE-2024-12797)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:1330", "url": "https://access.redhat.com/errata/RHSA-2025:1330" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2342757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342757" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_1330.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2025-02-27T20:08:31+00:00", "generator": { "date": "2025-02-27T20:08:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2025:1330", "initial_release_date": "2025-02-11T16:50:14+00:00", "revision_history": [ { "date": "2025-02-11T16:50:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-02-11T16:50:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-27T20:08:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:3.2.2-6.el9_5.1.src", "product": { "name": "openssl-1:3.2.2-6.el9_5.1.src", "product_id": "openssl-1:3.2.2-6.el9_5.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@3.2.2-6.el9_5.1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-1:3.2.2-6.el9_5.1.aarch64", "product": { "name": "openssl-1:3.2.2-6.el9_5.1.aarch64", "product_id": "openssl-1:3.2.2-6.el9_5.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@3.2.2-6.el9_5.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:3.2.2-6.el9_5.1.aarch64", "product": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.aarch64", "product_id": "openssl-libs-1:3.2.2-6.el9_5.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64", "product": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64", "product_id": "openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@3.2.2-6.el9_5.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "product": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "product_id": "openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@3.2.2-6.el9_5.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "product": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "product_id": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@3.2.2-6.el9_5.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:3.2.2-6.el9_5.1.aarch64", "product": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.aarch64", "product_id": "openssl-devel-1:3.2.2-6.el9_5.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@3.2.2-6.el9_5.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:3.2.2-6.el9_5.1.aarch64", "product": { "name": "openssl-perl-1:3.2.2-6.el9_5.1.aarch64", "product_id": "openssl-perl-1:3.2.2-6.el9_5.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@3.2.2-6.el9_5.1?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssl-1:3.2.2-6.el9_5.1.ppc64le", "product": { "name": "openssl-1:3.2.2-6.el9_5.1.ppc64le", "product_id": "openssl-1:3.2.2-6.el9_5.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@3.2.2-6.el9_5.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:3.2.2-6.el9_5.1.ppc64le", "product": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.ppc64le", "product_id": "openssl-libs-1:3.2.2-6.el9_5.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le", "product": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le", "product_id": "openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@3.2.2-6.el9_5.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "product": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "product_id": "openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@3.2.2-6.el9_5.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "product": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "product_id": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@3.2.2-6.el9_5.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:3.2.2-6.el9_5.1.ppc64le", "product": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.ppc64le", "product_id": "openssl-devel-1:3.2.2-6.el9_5.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@3.2.2-6.el9_5.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:3.2.2-6.el9_5.1.ppc64le", "product": { "name": "openssl-perl-1:3.2.2-6.el9_5.1.ppc64le", "product_id": "openssl-perl-1:3.2.2-6.el9_5.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@3.2.2-6.el9_5.1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssl-1:3.2.2-6.el9_5.1.x86_64", "product": { "name": "openssl-1:3.2.2-6.el9_5.1.x86_64", "product_id": "openssl-1:3.2.2-6.el9_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@3.2.2-6.el9_5.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:3.2.2-6.el9_5.1.x86_64", "product": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.x86_64", "product_id": "openssl-libs-1:3.2.2-6.el9_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64", "product": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64", "product_id": "openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@3.2.2-6.el9_5.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "product": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "product_id": "openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@3.2.2-6.el9_5.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "product": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "product_id": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@3.2.2-6.el9_5.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:3.2.2-6.el9_5.1.x86_64", "product": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.x86_64", "product_id": "openssl-devel-1:3.2.2-6.el9_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@3.2.2-6.el9_5.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:3.2.2-6.el9_5.1.x86_64", "product": { "name": "openssl-perl-1:3.2.2-6.el9_5.1.x86_64", "product_id": "openssl-perl-1:3.2.2-6.el9_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@3.2.2-6.el9_5.1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-libs-1:3.2.2-6.el9_5.1.i686", "product": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.i686", "product_id": "openssl-libs-1:3.2.2-6.el9_5.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.i686", "product": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.i686", "product_id": "openssl-debugsource-1:3.2.2-6.el9_5.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@3.2.2-6.el9_5.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.i686", "product": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.i686", "product_id": "openssl-debuginfo-1:3.2.2-6.el9_5.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@3.2.2-6.el9_5.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686", "product": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686", "product_id": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@3.2.2-6.el9_5.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:3.2.2-6.el9_5.1.i686", "product": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.i686", "product_id": "openssl-devel-1:3.2.2-6.el9_5.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@3.2.2-6.el9_5.1?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-1:3.2.2-6.el9_5.1.s390x", "product": { "name": "openssl-1:3.2.2-6.el9_5.1.s390x", "product_id": "openssl-1:3.2.2-6.el9_5.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@3.2.2-6.el9_5.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:3.2.2-6.el9_5.1.s390x", "product": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.s390x", "product_id": "openssl-libs-1:3.2.2-6.el9_5.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@3.2.2-6.el9_5.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.s390x", "product": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.s390x", "product_id": "openssl-debugsource-1:3.2.2-6.el9_5.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@3.2.2-6.el9_5.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x", "product": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x", "product_id": "openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@3.2.2-6.el9_5.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x", "product": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x", "product_id": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@3.2.2-6.el9_5.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:3.2.2-6.el9_5.1.s390x", "product": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.s390x", "product_id": "openssl-devel-1:3.2.2-6.el9_5.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@3.2.2-6.el9_5.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:3.2.2-6.el9_5.1.s390x", "product": { "name": "openssl-perl-1:3.2.2-6.el9_5.1.s390x", "product_id": "openssl-perl-1:3.2.2-6.el9_5.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@3.2.2-6.el9_5.1?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.2.2-6.el9_5.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.src" }, "product_reference": "openssl-1:3.2.2-6.el9_5.1.src", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.i686" }, "product_reference": "openssl-debuginfo-1:3.2.2-6.el9_5.1.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.i686" }, "product_reference": "openssl-debugsource-1:3.2.2-6.el9_5.1.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-debugsource-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-devel-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.i686" }, "product_reference": "openssl-devel-1:3.2.2-6.el9_5.1.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-devel-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-devel-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-devel-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-libs-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.i686" }, "product_reference": "openssl-libs-1:3.2.2-6.el9_5.1.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-libs-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-libs-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-libs-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686" }, "product_reference": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-perl-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-perl-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-perl-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-perl-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.2.2-6.el9_5.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.src" }, "product_reference": "openssl-1:3.2.2-6.el9_5.1.src", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.i686" }, "product_reference": "openssl-debuginfo-1:3.2.2-6.el9_5.1.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.i686" }, "product_reference": "openssl-debugsource-1:3.2.2-6.el9_5.1.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-debugsource-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-devel-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.i686" }, "product_reference": "openssl-devel-1:3.2.2-6.el9_5.1.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-devel-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-devel-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-devel-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-libs-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.i686" }, "product_reference": "openssl-libs-1:3.2.2-6.el9_5.1.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-libs-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-libs-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-libs-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686" }, "product_reference": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.2.2-6.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.aarch64" }, "product_reference": "openssl-perl-1:3.2.2-6.el9_5.1.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.2.2-6.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.ppc64le" }, "product_reference": "openssl-perl-1:3.2.2-6.el9_5.1.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.2.2-6.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.s390x" }, "product_reference": "openssl-perl-1:3.2.2-6.el9_5.1.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:3.2.2-6.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.x86_64" }, "product_reference": "openssl-perl-1:3.2.2-6.el9_5.1.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-12797", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2025-01-29T09:25:13.972000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2342757" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL\u0027s RFC7250 Raw Public Key (RPK) authentication. This vulnerability allows man-in-the-middle (MITM) attacks via failure to abort TLS/DTLS handshakes when the server\u0027s RPK does not match the expected key despite the SSL_VERIFY_PEER verification mode being set.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: RFC7250 handshakes with unauthenticated servers don\u0027t abort as expected", "title": "Vulnerability summary" }, { "category": "other", "text": "The version of OpenSSL in RHEL-9.5 is affected by this vulnerability. However, earlier releases of OpenSSL in RHEL are not affected. This issue was introduced in the initial implementation of RPK support in OpenSSL 3.2.\n\nRPKs are disabled by default in both TLS clients and TLS servers. The issue only arises when TLS clients explicitly enable RPK use by the server, and the server, likewise, enables sending of an RPK instead of an X.509 certificate chain. The affected clients are those that then rely on the handshake to fail when the server\u0027s RPK fails to match one of the expected public keys, by setting the verification mode to SSL_VERIFY_PEER. \n\nClients that enable server-side raw public keys can still find out that raw public key verification failed by calling SSL_get_verify_result(), and those that do, and take appropriate action, are not affected.\n\nrhel9/ruby-33 \u0026 ubi9/ruby-33 are not affected because RPK is not present in any form or as any function that could be called from Ruby via Red Hat supported RPMs in RHEL. For example the SSL_dane_enable or SSL_add_expected_rpk or X509_STORE_CTX_get0_rpk or X509_STORE_CTX_init_rpk (and more rpk-related) functions are not callable from Ruby.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.src", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.src", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-12797" }, { "category": "external", "summary": "RHBZ#2342757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-12797", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12797" } ], "release_date": "2025-02-11T15:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-02-11T16:50:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.src", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.src", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:1330" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.src", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.src", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.src", "AppStream-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.aarch64", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.ppc64le", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.s390x", "AppStream-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.src", "BaseOS-9.5.0.Z.MAIN:openssl-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-debugsource-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-devel-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-libs-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.i686", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-libs-debuginfo-1:3.2.2-6.el9_5.1.x86_64", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.aarch64", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.ppc64le", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.s390x", "BaseOS-9.5.0.Z.MAIN:openssl-perl-1:3.2.2-6.el9_5.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: RFC7250 handshakes with unauthenticated servers don\u0027t abort as expected" } ] }
rhsa-2025:1487
Vulnerability from csaf_redhat
Published
2025-02-13 20:14
Modified
2025-02-27 20:08
Summary
Red Hat Security Advisory: updated discovery container images
Notes
Topic
Updated container images are now available for Discovery 1.12.1.
Details
The Discovery container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).
Dockerfiles and scripts should be amended either to refer to these new images specifically, or to the latest images generally.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated container images are now available for Discovery 1.12.1.", "title": "Topic" }, { "category": "general", "text": "The Discovery container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to these new images specifically, or to the latest images generally.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:1487", "url": "https://access.redhat.com/errata/RHSA-2025:1487" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2342118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342118" }, { "category": "external", "summary": "2342757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342757" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_1487.json" } ], "title": "Red Hat Security Advisory: updated discovery container images", "tracking": { "current_release_date": "2025-02-27T20:08:40+00:00", "generator": { "date": "2025-02-27T20:08:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2025:1487", "initial_release_date": "2025-02-13T20:14:49+00:00", "revision_history": [ { "date": "2025-02-13T20:14:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-02-13T20:14:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-27T20:08:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Discovery 1 for RHEL 9", "product": { "name": "Discovery 1 for RHEL 9", "product_id": "9Base-discovery-1", "product_identification_helper": { "cpe": "cpe:/o:redhat:discovery:1.0::el9" } } } ], "category": "product_family", "name": "Red Hat Discovery" }, { "branches": [ { "category": "product_version", "name": "discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64", "product": { "name": "discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64", "product_id": "discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d?arch=amd64\u0026repository_url=registry.redhat.io/discovery/discovery-server-rhel9\u0026tag=1.12.1-2" } } }, { "category": "product_version", "name": "discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64", "product": { "name": "discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64", "product_id": "discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40?arch=amd64\u0026repository_url=registry.redhat.io/discovery/discovery-ui-rhel9\u0026tag=1.12.0-2" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64", "product": { "name": "discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64", "product_id": "discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64", "product_identification_helper": { "purl": "pkg:oci/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c?arch=arm64\u0026repository_url=registry.redhat.io/discovery/discovery-server-rhel9\u0026tag=1.12.1-2" } } }, { "category": "product_version", "name": "discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64", "product": { "name": "discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64", "product_id": "discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64", "product_identification_helper": { "purl": "pkg:oci/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb?arch=arm64\u0026repository_url=registry.redhat.io/discovery/discovery-ui-rhel9\u0026tag=1.12.0-2" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64 as a component of Discovery 1 for RHEL 9", "product_id": "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64" }, "product_reference": "discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64", "relates_to_product_reference": "9Base-discovery-1" }, { "category": "default_component_of", "full_product_name": { "name": "discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64 as a component of Discovery 1 for RHEL 9", "product_id": "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64" }, "product_reference": "discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64", "relates_to_product_reference": "9Base-discovery-1" }, { "category": "default_component_of", "full_product_name": { "name": "discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64 as a component of Discovery 1 for RHEL 9", "product_id": "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64" }, "product_reference": "discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64", "relates_to_product_reference": "9Base-discovery-1" }, { "category": "default_component_of", "full_product_name": { "name": "discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64 as a component of Discovery 1 for RHEL 9", "product_id": "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64" }, "product_reference": "discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64", "relates_to_product_reference": "9Base-discovery-1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-49043", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-01-26T06:00:41.448197+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2342118" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2 where improper handling of memory allocation failures in `libxml2` can lead to crashes, memory leaks, or inconsistent states. While an attacker cannot directly control allocation failures, they may trigger denial-of-service conditions under extreme system stress.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml: use-after-free in xmlXIncludeAddNode", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability marked as moderate instead of important because memory allocation failures are not typically controllable by an attacker, limiting their exploitability. While improper handling of malloc failures can lead to crashes, memory leaks, or inconsistent states, it does not directly result in privilege escalation or arbitrary code execution. \n\nAdditionally, in most real-world scenarios, failures due to memory exhaustion occur under extreme system stress rather than as part of an intentional attack vector.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64", "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-49043" }, { "category": "external", "summary": "RHBZ#2342118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-49043", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49043", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49043" }, { "category": "external", "summary": "https://github.com/php/php-src/issues/17467", "url": "https://github.com/php/php-src/issues/17467" }, { "category": "external", "summary": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b", "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b" } ], "release_date": "2025-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-02-13T20:14:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64", "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:1487" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64", "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64", "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml: use-after-free in xmlXIncludeAddNode" }, { "cve": "CVE-2024-12797", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2025-01-29T09:25:13.972000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2342757" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL\u0027s RFC7250 Raw Public Key (RPK) authentication. This vulnerability allows man-in-the-middle (MITM) attacks via failure to abort TLS/DTLS handshakes when the server\u0027s RPK does not match the expected key despite the SSL_VERIFY_PEER verification mode being set.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: RFC7250 handshakes with unauthenticated servers don\u0027t abort as expected", "title": "Vulnerability summary" }, { "category": "other", "text": "The version of OpenSSL in RHEL-9.5 is affected by this vulnerability. However, earlier releases of OpenSSL in RHEL are not affected. This issue was introduced in the initial implementation of RPK support in OpenSSL 3.2.\n\nRPKs are disabled by default in both TLS clients and TLS servers. The issue only arises when TLS clients explicitly enable RPK use by the server, and the server, likewise, enables sending of an RPK instead of an X.509 certificate chain. The affected clients are those that then rely on the handshake to fail when the server\u0027s RPK fails to match one of the expected public keys, by setting the verification mode to SSL_VERIFY_PEER. \n\nClients that enable server-side raw public keys can still find out that raw public key verification failed by calling SSL_get_verify_result(), and those that do, and take appropriate action, are not affected.\n\nrhel9/ruby-33 \u0026 ubi9/ruby-33 are not affected because RPK is not present in any form or as any function that could be called from Ruby via Red Hat supported RPMs in RHEL. For example the SSL_dane_enable or SSL_add_expected_rpk or X509_STORE_CTX_get0_rpk or X509_STORE_CTX_init_rpk (and more rpk-related) functions are not callable from Ruby.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64", "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-12797" }, { "category": "external", "summary": "RHBZ#2342757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-12797", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12797" } ], "release_date": "2025-02-11T15:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-02-13T20:14:49+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64", "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:1487" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64", "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:0039a72903a937c9a1911349c2dc773e7eda419e455673d37dfc78a668997a7d_amd64", "9Base-discovery-1:discovery/discovery-server-rhel9@sha256:3cad667d877279a9bbe7e98caa8c987a98f4a57776ecd317f37869c450e3c97c_arm64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:249741f52ed19d2af800609f8b0a1c75994556def2964ee754afc5b95758ab40_amd64", "9Base-discovery-1:discovery/discovery-ui-rhel9@sha256:86850a0b8c5f4268874eb4f3e80af4cd7fd83803d08db278741c7c5311e5f1eb_arm64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: RFC7250 handshakes with unauthenticated servers don\u0027t abort as expected" } ] }
rhsa-2025:1925
Vulnerability from csaf_redhat
Published
2025-02-27 15:19
Modified
2025-02-27 20:08
Summary
Red Hat Security Advisory: Updated service-interconnect rhel9 container images for 1.5
Notes
Topic
Updated service-interconnect container images are now available for Service Interconnect 1.5 for RHEL 9.
Details
Users of service-interconnect 1.5 rhel9 container images are advised
to upgrade to these updated images, which contain backported patches to correct security issues and fix bugs.
Users of these images are also encouraged to rebuild all container images that depend on these images.
You can find images updated by this advisory the in Red Hat Container Catalog
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated service-interconnect container images are now available for Service Interconnect 1.5 for RHEL 9.", "title": "Topic" }, { "category": "general", "text": "Users of service-interconnect 1.5 rhel9 container images are advised\nto upgrade to these updated images, which contain backported patches to correct security issues and fix bugs. \nUsers of these images are also encouraged to rebuild all container images that depend on these images.\nYou can find images updated by this advisory the in Red Hat Container Catalog", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:1925", "url": "https://access.redhat.com/errata/RHSA-2025:1925" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2342118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342118" }, { "category": "external", "summary": "2342757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342757" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_1925.json" } ], "title": "Red Hat Security Advisory: Updated service-interconnect rhel9 container images for 1.5", "tracking": { "current_release_date": "2025-02-27T20:08:55+00:00", "generator": { "date": "2025-02-27T20:08:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2025:1925", "initial_release_date": "2025-02-27T15:19:12+00:00", "revision_history": [ { "date": "2025-02-27T15:19:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-02-27T15:19:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-27T20:08:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Service Interconnect 1", "product": { "name": "Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_interconnect:1::el9" } } } ], "category": "product_family", "name": "Red Hat Service Interconnect" }, { "branches": [ { "category": "product_version", "name": "service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x", "product": { "name": "service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x", "product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x", "product_identification_helper": { "purl": "pkg:oci/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "product": { "name": "service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "product_id": "service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "product_identification_helper": { "purl": "pkg:oci/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "product": { "name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "product_id": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "product_identification_helper": { "purl": "pkg:oci/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-container-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x", "product": { "name": "service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x", "product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x", "product_identification_helper": { "purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x", "product": { "name": "service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x", "product_id": "service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x", "product_identification_helper": { "purl": "pkg:oci/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.5.3-7" } } }, { "category": "product_version", "name": "service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x", "product": { "name": "service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x", "product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x", "product_identification_helper": { "purl": "pkg:oci/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x", "product": { "name": "service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x", "product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x", "product_identification_helper": { "purl": "pkg:oci/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6?arch=s390x\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.5.5-5" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le", "product": { "name": "service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le", "product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le", "product_identification_helper": { "purl": "pkg:oci/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "product": { "name": "service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "product_id": "service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "product": { "name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "product_id": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-container-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le", "product": { "name": "service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le", "product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le", "product": { "name": "service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le", "product_id": "service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le", "product_identification_helper": { "purl": "pkg:oci/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.5.3-7" } } }, { "category": "product_version", "name": "service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le", "product": { "name": "service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le", "product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le", "product_identification_helper": { "purl": "pkg:oci/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le", "product": { "name": "service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le", "product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c?arch=ppc64le\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.5.5-5" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64", "product": { "name": "service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64", "product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64", "product_identification_helper": { "purl": "pkg:oci/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "product": { "name": "service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "product_id": "service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "product_identification_helper": { "purl": "pkg:oci/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "product": { "name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "product_id": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "product_identification_helper": { "purl": "pkg:oci/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-container-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64", "product": { "name": "service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64", "product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64", "product_identification_helper": { "purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64", "product": { "name": "service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64", "product_id": "service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64", "product_identification_helper": { "purl": "pkg:oci/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-operator-bundle\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64", "product": { "name": "service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64", "product_id": "service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64", "product_identification_helper": { "purl": "pkg:oci/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.5.3-7" } } }, { "category": "product_version", "name": "service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64", "product": { "name": "service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64", "product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64", "product_identification_helper": { "purl": "pkg:oci/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64", "product": { "name": "service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64", "product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64", "product_identification_helper": { "purl": "pkg:oci/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213?arch=amd64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.5.5-5" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64", "product": { "name": "service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64", "product_id": "service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64", "product_identification_helper": { "purl": "pkg:oci/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-config-sync-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "product": { "name": "service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "product_id": "service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "product_identification_helper": { "purl": "pkg:oci/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "product": { "name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "product_id": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "product_identification_helper": { "purl": "pkg:oci/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-controller-podman-container-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64", "product": { "name": "service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64", "product_id": "service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64", "product_identification_helper": { "purl": "pkg:oci/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64", "product": { "name": "service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64", "product_id": "service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64", "product_identification_helper": { "purl": "pkg:oci/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-operator-bundle\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64", "product": { "name": "service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64", "product_id": "service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64", "product_identification_helper": { "purl": "pkg:oci/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-router-rhel9\u0026tag=2.5.3-7" } } }, { "category": "product_version", "name": "service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64", "product": { "name": "service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64", "product_id": "service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64", "product_identification_helper": { "purl": "pkg:oci/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-service-controller-rhel9\u0026tag=1.5.5-5" } } }, { "category": "product_version", "name": "service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64", "product": { "name": "service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64", "product_id": "service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64", "product_identification_helper": { "purl": "pkg:oci/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a?arch=arm64\u0026repository_url=registry.redhat.io/service-interconnect/skupper-site-controller-rhel9\u0026tag=1.5.5-5" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le" }, "product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64" }, "product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x" }, "product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64" }, "product_reference": "service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le" }, "product_reference": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64" }, "product_reference": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64" }, "product_reference": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x" }, "product_reference": "service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le" }, "product_reference": "service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64" }, "product_reference": "service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64" }, "product_reference": "service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x" }, "product_reference": "service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x" }, "product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64" }, "product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le" }, "product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64" }, "product_reference": "service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64" }, "product_reference": "service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64" }, "product_reference": "service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x" }, "product_reference": "service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le" }, "product_reference": "service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64" }, "product_reference": "service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64" }, "product_reference": "service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x" }, "product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64" }, "product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le" }, "product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64" }, "product_reference": "service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64" }, "product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x" }, "product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64" }, "product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le" }, "product_reference": "service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le", "relates_to_product_reference": "9Base-Service-Interconnect-1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-49043", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-01-26T06:00:41.448197+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2342118" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2 where improper handling of memory allocation failures in `libxml2` can lead to crashes, memory leaks, or inconsistent states. While an attacker cannot directly control allocation failures, they may trigger denial-of-service conditions under extreme system stress.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml: use-after-free in xmlXIncludeAddNode", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability marked as moderate instead of important because memory allocation failures are not typically controllable by an attacker, limiting their exploitability. While improper handling of malloc failures can lead to crashes, memory leaks, or inconsistent states, it does not directly result in privilege escalation or arbitrary code execution. \n\nAdditionally, in most real-world scenarios, failures due to memory exhaustion occur under extreme system stress rather than as part of an intentional attack vector.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-49043" }, { "category": "external", "summary": "RHBZ#2342118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-49043", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49043", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49043" }, { "category": "external", "summary": "https://github.com/php/php-src/issues/17467", "url": "https://github.com/php/php-src/issues/17467" }, { "category": "external", "summary": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b", "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b" } ], "release_date": "2025-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-02-27T15:19:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:1925" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml: use-after-free in xmlXIncludeAddNode" }, { "cve": "CVE-2024-12797", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2025-01-29T09:25:13.972000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2342757" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL\u0027s RFC7250 Raw Public Key (RPK) authentication. This vulnerability allows man-in-the-middle (MITM) attacks via failure to abort TLS/DTLS handshakes when the server\u0027s RPK does not match the expected key despite the SSL_VERIFY_PEER verification mode being set.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: RFC7250 handshakes with unauthenticated servers don\u0027t abort as expected", "title": "Vulnerability summary" }, { "category": "other", "text": "The version of OpenSSL in RHEL-9.5 is affected by this vulnerability. However, earlier releases of OpenSSL in RHEL are not affected. This issue was introduced in the initial implementation of RPK support in OpenSSL 3.2.\n\nRPKs are disabled by default in both TLS clients and TLS servers. The issue only arises when TLS clients explicitly enable RPK use by the server, and the server, likewise, enables sending of an RPK instead of an X.509 certificate chain. The affected clients are those that then rely on the handshake to fail when the server\u0027s RPK fails to match one of the expected public keys, by setting the verification mode to SSL_VERIFY_PEER. \n\nClients that enable server-side raw public keys can still find out that raw public key verification failed by calling SSL_get_verify_result(), and those that do, and take appropriate action, are not affected.\n\nrhel9/ruby-33 \u0026 ubi9/ruby-33 are not affected because RPK is not present in any form or as any function that could be called from Ruby via Red Hat supported RPMs in RHEL. For example the SSL_dane_enable or SSL_add_expected_rpk or X509_STORE_CTX_get0_rpk or X509_STORE_CTX_init_rpk (and more rpk-related) functions are not callable from Ruby.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-12797" }, { "category": "external", "summary": "RHBZ#2342757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-12797", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12797" } ], "release_date": "2025-02-11T15:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-02-27T15:19:12+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:1925" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:30115c9b2120a26e484146dc71c12b29a30ecd485c81fd5fb29e5e4389861759_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:bcd9b1eebb1e5491e884a4a5e857e6743eee0332369d3cac4215705a2eaec3db_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:d6de7a6622cedd4dc3ac6afa2a73e606cb8510473c7032398d9f2b53e4d64899_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-config-sync-rhel9@sha256:fbb0e80f748e6a82070fe1ac15e161cdfa969fe9eee421540ddc5ccd79bccb9f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-container-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:21db1ab4bbe383754294a19f33a3ccbe40f499f5f2df7624381bd4f11602c8fa_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:4580138c3932022cd533df65518ca737af69d606072c1856cb9fa66d4100e713_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:8b7b9fe664ef3dc5a6b218c815f1edcabec541173e0e9a83e07527ed732dfe84_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-controller-podman-rhel9@sha256:d3aef991e1ad35b315ff35258c13ad047f14cae5b06c31be8f2e9d70f33cbad0_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:0a67d970179bd8ba17269188a7efb7bb1eb4a95767785493cfeab16202900805_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:7356a4434fec942da25a1e5b07ccc275227f25014677bf1a4f8219be366ad5ba_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:9b163afc57029a88e40d8d4f01debcb23e6fe16e62e40516223460a4a6a68c8b_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-flow-collector-rhel9@sha256:b64e0bbaf2908375c035b39eb2a2f6555e51ad1038f508f43ab17c336455e9df_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:aa261c79b421bd49f7b46974a3bb5a790d5a1a73dd8dea4e1d8a4634fb68a51f_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-operator-bundle@sha256:c69e4d0fead7f1c7ebcf8ba6db15174834fc3f7e688c30e2cae909a97dfa69f6_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:5230df96174fd1e853df6bd260995c3d2183d46a3c7e904c512cc27935d90212_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:76b56fc2b2f1207ad55d35ed417514392bc493b42bf6b59559a88d9498da3a87_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:8f56e9305e12338e06da08df969352343d0628d849e48e0f3680a511219dddb3_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-router-rhel9@sha256:a938aca556d341ffa28f15f802ee37a9b006080133a331bfed91b0b33e0a6a58_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:1d251d69f7bc5829be1382243c1726bd840effe9dcfe38ec88ab39766a56641f_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:5171946a13799ac7f8418401cc52570de6f8461bf7f7dbb24e61e95c595dfd6d_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:60ef9cb82e10b5a0df32a7b7d9608a88757d12aeaefa78f5baa015c5d5c6c022_ppc64le", "9Base-Service-Interconnect-1:service-interconnect/skupper-service-controller-rhel9@sha256:ffa3fc0b945eaaa5d36c4bf7d5695b6822094efdaf0630227e32cba1997bd3c1_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:365ec90eb7c5f438d2732e574e5c19ae206f4911aa674c1eb8dcfb73f7b35d1a_arm64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:5afb52c741b2261f5e7a93c16d625363fdc2f0db7189272a73e9cf9f521deef6_s390x", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:685a0f17bc225b89e93bb7abc2a487ef0607d16b2e6c534df46483d83ccb1213_amd64", "9Base-Service-Interconnect-1:service-interconnect/skupper-site-controller-rhel9@sha256:b72b7d4225026dfebe1191bd38b61cce71740b151cd2e5c1b2a4871c02b9cc5c_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: RFC7250 handshakes with unauthenticated servers don\u0027t abort as expected" } ] }
fkie_cve-2024-12797
Vulnerability from fkie_nvd
Published
2025-02-11 16:15
Modified
2025-02-18 14:15
Severity ?
Summary
Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a
server may fail to notice that the server was not authenticated, because
handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode
is set.
Impact summary: TLS and DTLS connections using raw public keys may be
vulnerable to man-in-middle attacks when server authentication failure is not
detected by clients.
RPKs are disabled by default in both TLS clients and TLS servers. The issue
only arises when TLS clients explicitly enable RPK use by the server, and the
server, likewise, enables sending of an RPK instead of an X.509 certificate
chain. The affected clients are those that then rely on the handshake to
fail when the server's RPK fails to match one of the expected public keys,
by setting the verification mode to SSL_VERIFY_PEER.
Clients that enable server-side raw public keys can still find out that raw
public key verification failed by calling SSL_get_verify_result(), and those
that do, and take appropriate action, are not affected. This issue was
introduced in the initial implementation of RPK support in OpenSSL 3.2.
The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a\nserver may fail to notice that the server was not authenticated, because\nhandshakes don\u0027t abort as expected when the SSL_VERIFY_PEER verification mode\nis set.\n\nImpact summary: TLS and DTLS connections using raw public keys may be\nvulnerable to man-in-middle attacks when server authentication failure is not\ndetected by clients.\n\nRPKs are disabled by default in both TLS clients and TLS servers. The issue\nonly arises when TLS clients explicitly enable RPK use by the server, and the\nserver, likewise, enables sending of an RPK instead of an X.509 certificate\nchain. The affected clients are those that then rely on the handshake to\nfail when the server\u0027s RPK fails to match one of the expected public keys,\nby setting the verification mode to SSL_VERIFY_PEER.\n\nClients that enable server-side raw public keys can still find out that raw\npublic key verification failed by calling SSL_get_verify_result(), and those\nthat do, and take appropriate action, are not affected. This issue was\nintroduced in the initial implementation of RPK support in OpenSSL 3.2.\n\nThe FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue." }, { "lang": "es", "value": "Resumen del problema: los clientes que utilizan claves p\u00fablicas sin procesar (RPK) RFC7250 para autenticar un servidor pueden no darse cuenta de que el servidor no se ha autenticado, porque los protocolos de enlace no se cancelan como se espera cuando se establece el modo de verificaci\u00f3n SSL_VERIFY_PEER. Resumen del impacto: las conexiones TLS y DTLS que utilizan claves p\u00fablicas sin procesar pueden ser vulnerables a ataques de intermediarios cuando los clientes no detectan un error de autenticaci\u00f3n del servidor. Las RPK est\u00e1n deshabilitadas de forma predeterminada tanto en los clientes TLS como en los servidores TLS. El problema solo surge cuando los clientes TLS habilitan expl\u00edcitamente el uso de RPK por parte del servidor y el servidor, a su vez, habilita el env\u00edo de una RPK en lugar de una cadena de certificados X.509. Los clientes afectados son aquellos que dependen de que el protocolo de enlace falle cuando la RPK del servidor no coincide con una de las claves p\u00fablicas esperadas, al establecer el modo de verificaci\u00f3n en SSL_VERIFY_PEER. Los clientes que habilitan claves p\u00fablicas sin procesar del lado del servidor a\u00fan pueden descubrir que la verificaci\u00f3n de clave p\u00fablica sin procesar fall\u00f3 al llamar a SSL_get_verify_result(), y aquellos que lo hacen y toman las medidas adecuadas no se ven afectados. Este problema se introdujo en la implementaci\u00f3n inicial de la compatibilidad con RPK en OpenSSL 3.2. Los m\u00f3dulos FIPS en 3.4, 3.3, 3.2, 3.1 y 3.0 no se ven afectados por este problema." } ], "id": "CVE-2024-12797", "lastModified": "2025-02-18T14:15:27.107", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-02-11T16:15:38.827", "references": [ { "source": "openssl-security@openssl.org", "url": "https://github.com/openssl/openssl/commit/738d4f9fdeaad57660dcba50a619fafced3fd5e9" }, { "source": "openssl-security@openssl.org", "url": "https://github.com/openssl/openssl/commit/798779d43494549b611233f92652f0da5328fbe7" }, { "source": "openssl-security@openssl.org", "url": "https://github.com/openssl/openssl/commit/87ebd203feffcf92ad5889df92f90bb0ee10a699" }, { "source": "openssl-security@openssl.org", "url": "https://openssl-library.org/news/secadv/20250211.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2025/02/11/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2025/02/11/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20250214-0001/" } ], "sourceIdentifier": "openssl-security@openssl.org", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-392" } ], "source": "openssl-security@openssl.org", "type": "Secondary" } ] }
ghsa-79v4-65xg-pq4g
Vulnerability from github
Published
2025-02-11 18:06
Modified
2025-02-12 18:20
Summary
Vulnerable OpenSSL included in cryptography wheels
Details
pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 42.0.0-44.0.0 are vulnerable to a security issue. More details about the vulnerability itself can be found in https://openssl-library.org/news/secadv/20250211.txt.
If you are building cryptography source ("sdist") then you are responsible for upgrading your copy of OpenSSL. Only users installing from wheels built by the cryptography project (i.e., those distributed on PyPI) need to update their cryptography versions.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "cryptography" }, "ranges": [ { "events": [ { "introduced": "42.0.0" }, { "fixed": "44.0.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-12797" ], "database_specific": { "cwe_ids": [ "CWE-1395", "CWE-392" ], "github_reviewed": true, "github_reviewed_at": "2025-02-11T18:06:42Z", "nvd_published_at": "2025-02-11T16:15:38Z", "severity": "LOW" }, "details": "pyca/cryptography\u0027s wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 42.0.0-44.0.0 are vulnerable to a security issue. More details about the vulnerability itself can be found in https://openssl-library.org/news/secadv/20250211.txt.\n\nIf you are building cryptography source (\"sdist\") then you are responsible for upgrading your copy of OpenSSL. Only users installing from wheels built by the cryptography project (i.e., those distributed on PyPI) need to update their cryptography versions.", "id": "GHSA-79v4-65xg-pq4g", "modified": "2025-02-12T18:20:06Z", "published": "2025-02-11T18:06:42Z", "references": [ { "type": "WEB", "url": "https://github.com/pyca/cryptography/security/advisories/GHSA-79v4-65xg-pq4g" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12797" }, { "type": "WEB", "url": "https://github.com/openssl/openssl/commit/738d4f9fdeaad57660dcba50a619fafced3fd5e9" }, { "type": "WEB", "url": "https://github.com/openssl/openssl/commit/798779d43494549b611233f92652f0da5328fbe7" }, { "type": "WEB", "url": "https://github.com/openssl/openssl/commit/87ebd203feffcf92ad5889df92f90bb0ee10a699" }, { "type": "PACKAGE", "url": "https://github.com/pyca/cryptography" }, { "type": "WEB", "url": "https://openssl-library.org/news/secadv/20250211.txt" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2025/02/11/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2025/02/11/4" } ], "schema_version": "1.4.0", "severity": [], "summary": "Vulnerable OpenSSL included in cryptography wheels" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.