Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2022-23524
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.450Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "helm", "vendor": "helm", "versions": [ { "status": "affected", "version": "\u003c v3.10.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Helm is a tool for managing Charts, pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to Uncontrolled Resource Consumption, resulting in Denial of Service. Input to functions in the _strvals_ package can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics. This issue has been patched in 3.10.3. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-15T00:28:34.540Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r" } ], "source": { "advisory": "GHSA-6rx9-889q-vv2r", "discovery": "UNKNOWN" }, "title": "Helm vulnerable to Denial of service through string value parsing" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23524", "datePublished": "2022-12-15T00:28:34.540Z", "dateReserved": "2022-01-19T21:23:53.783Z", "dateUpdated": "2024-08-03T03:43:46.450Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-23524\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-12-15T19:15:16.863\",\"lastModified\":\"2024-11-21T06:48:44.807\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Helm is a tool for managing Charts, pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to Uncontrolled Resource Consumption, resulting in Denial of Service. Input to functions in the _strvals_ package can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics. This issue has been patched in 3.10.3. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.\"},{\"lang\":\"es\",\"value\":\"Helm es una herramienta para gestionar gr\u00e1ficos, recursos de Kubernetes preconfigurados. Las versiones anteriores a la 3.10.3 est\u00e1n sujetas a un consumo incontrolado de recursos, lo que resulta en una Denegaci\u00f3n de Servicio (DoS). La entrada a funciones en _strvals_ package puede provocar un desbordamiento de la pila. En Go, no se puede recuperar un desbordamiento de pila. Las aplicaciones que usan funciones de _strvals_ package en Helm SDK pueden sufrir un ataque de Denegaci\u00f3n de Servicio (DoS) cuando usan este paquete y entran en p\u00e1nico. Este problema se solucion\u00f3 en 3.10.3. Los usuarios del SDK pueden validar que las cadenas proporcionadas por los usuarios no creen matrices grandes que provoquen un uso significativo de la memoria antes de pasarlas a las _strvals_ functions.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.10.3\",\"matchCriteriaId\":\"135AAD77-267A-4119-877F-60195A002775\"}]}]}],\"references\":[{\"url\":\"https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
gsd-2022-23524
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-23524", "id": "GSD-2022-23524", "references": [ "https://www.suse.com/security/cve/CVE-2022-23524.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-23524" ], "details": "Helm is a tool for managing Charts, pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to Uncontrolled Resource Consumption, resulting in Denial of Service. Input to functions in the _strvals_ package can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics. This issue has been patched in 3.10.3. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.", "id": "GSD-2022-23524", "modified": "2023-12-13T01:19:35.356389Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-23524", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "helm", "version": { "version_data": [ { "version_affected": "=", "version_value": "\u003c v3.10.3" } ] } } ] }, "vendor_name": "helm" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Helm is a tool for managing Charts, pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to Uncontrolled Resource Consumption, resulting in Denial of Service. Input to functions in the _strvals_ package can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics. This issue has been patched in 3.10.3. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions." } ] }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-400", "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r", "refsource": "MISC", "url": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r" } ] }, "source": { "advisory": "GHSA-6rx9-889q-vv2r", "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c=v3.10.2", "affected_versions": "All versions up to 3.10.2", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-12-14", "description": "Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the _strvals_ package that can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.\n\n### Impact\n\nThe _strvals_ package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like `--set`, `--set-string`, and others that enable the user to pass in strings that are merged into the values. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing a stack overflow.\n\nApplications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes a stack overflow. Helm is not a long running service so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis issue has been resolved in 3.10.3. \n\n### Workarounds\n\nSDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.\n\n### For more information\n\nHelm\u0027s security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF.", "fixed_versions": [ "v3.10.3" ], "identifier": "GMS-2022-8502", "identifiers": [ "GHSA-6rx9-889q-vv2r", "GMS-2022-8502", "CVE-2022-23524" ], "not_impacted": "All versions after 3.10.2", "package_slug": "go/helm.sh/helm/v3", "pubdate": "2022-12-14", "solution": "Upgrade to version 3.10.3 or above.", "title": "Helm vulnerable to denial of service through string value parsing", "urls": [ "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r", "https://github.com/helm/helm/commit/3636f6824757ff734cb265b8770efe48c1fb3737", "https://github.com/advisories/GHSA-6rx9-889q-vv2r" ], "uuid": "a57d55c4-b869-4025-8dd5-b5ff0d9a7252", "versions": [] } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.10.3", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-23524" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Helm is a tool for managing Charts, pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to Uncontrolled Resource Consumption, resulting in Denial of Service. Input to functions in the _strvals_ package can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics. This issue has been patched in 3.10.3. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-770" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-06-27T18:20Z", "publishedDate": "2022-12-15T19:15Z" } } }
rhsa-2023:1646
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.12.11 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.11. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2023:1645\n\nSecurity Fix(es):\n\n* helm: Denial of service through string value parsing (CVE-2022-23524)\n\n* helm: Denial of service through through repository index file (CVE-2022-23525)\n\n* helm: Denial of service through schema file (CVE-2022-23526)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:1646", "url": "https://access.redhat.com/errata/RHSA-2023:1646" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "url": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html" }, { "category": "external", "summary": "2154196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154196" }, { "category": "external", "summary": "2154200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154200" }, { "category": "external", "summary": "2154202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1646.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.12.11 security update", "tracking": { "current_release_date": "2025-02-03T02:08:32+00:00", "generator": { "date": "2025-02-03T02:08:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.6" } }, "id": "RHSA-2023:1646", "initial_release_date": "2023-04-11T07:54:54+00:00", "revision_history": [ { "date": "2023-04-11T07:54:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-04-11T07:54:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-03T02:08:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.12", "product": { "name": "Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.12::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "product": { "name": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "product_id": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.12.0-202303301557.p0.ge8e0600.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.12.0-202303301557.p0.g3ce7998.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product": { "name": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product_id": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product_id": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/cloud-event-proxy-rhel8\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.12.0-202303301557.p0.g3d08a74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.12.0-202303301557.p0.g6f976ac.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "product": { "name": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "product_id": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "product": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "product": { "name": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "product_id": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "product_id": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.12.0-202303301557.p0.g5e2696b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "product": { "name": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "product_id": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "product": { "name": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "product_id": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.12.0-202303301557.p0.gbc2fa67.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "product_id": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "product": { "name": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "product_id": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "product": { "name": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "product_id": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "product_id": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.12.0-202303301557.p0.ga0f9090.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "product": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.12.0-202304031241.p0.ge8291b0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.12.0-202303301557.p0.g4cd14c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g5ff6387.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "product": { "name": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "product_id": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-contour-rhel8\u0026tag=v4.12.0-202303301557.p0.g45e9b62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.g20cffc0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "product_id": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "product": { "name": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "product_id": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "product_identification_helper": { "purl": "pkg:oci/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.12.0-202303301557.p0.g1c36ecd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8\u0026tag=v4.12.0-202303301557.p0.g390c723.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g7ed738d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "product": { "name": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "product_id": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.12.0-202303301557.p0.g79f4296.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product": { "name": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product_id": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product": { "name": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product_id": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "product": { "name": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "product_id": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g270d2eb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "product": { "name": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "product_id": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.12.0-202303301557.p0.g6ab8e62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.ga64bda3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "product": { "name": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "product_id": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "product": { "name": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "product_id": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.12.0-202303301557.p0.gbf74bbd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.12.0-202303301557.p0.g21f48c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.12.0-202303301557.p0.g851a66b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "product_id": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "product_id": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "product": { "name": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "product_id": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.12.0-202303301557.p0.ge8e0600.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.12.0-202303301557.p0.g3ce7998.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product": { "name": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product_id": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product_id": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product_identification_helper": { "purl": "pkg:oci/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/cloud-event-proxy-rhel8\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.12.0-202303301557.p0.g3d08a74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "product": { "name": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "product_id": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "product_identification_helper": { "purl": "pkg:oci/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/dpu-network-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gbc123b4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.12.0-202303301557.p0.g6f976ac.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "product": { "name": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "product_id": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "product": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "product": { "name": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "product_id": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "product_id": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.12.0-202303301557.p0.g5e2696b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "product": { "name": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "product_id": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "product": { "name": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "product_id": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.12.0-202303301557.p0.gbc2fa67.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "product_id": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "product": { "name": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "product_id": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "product": { "name": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "product_id": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "product_id": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.12.0-202303301557.p0.ga0f9090.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "product": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.12.0-202304031241.p0.ge8291b0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "product_id": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel8\u0026tag=v4.12.0-202303301557.p0.ge59aa10.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "product_id": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gcc89dfb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.12.0-202303301557.p0.g4cd14c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g5ff6387.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "product": { "name": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "product_id": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-contour-rhel8\u0026tag=v4.12.0-202303301557.p0.g45e9b62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.g20cffc0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "product_id": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "product": { "name": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "product_id": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "product_identification_helper": { "purl": "pkg:oci/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.12.0-202303301557.p0.g1c36ecd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "product": { "name": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "product_id": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.12.0-202303301557.p0.g79f4296.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product": { "name": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product_id": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905?arch=arm64\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product": { "name": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product_id": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "product": { "name": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "product_id": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g270d2eb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "product": { "name": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "product_id": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.12.0-202303301557.p0.g6ab8e62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.ga64bda3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64", "product": { "name": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64", "product_id": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "product": { "name": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "product_id": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.12.0-202303301557.p0.gbf74bbd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.12.0-202303301557.p0.g21f48c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.12.0-202303301557.p0.g851a66b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "product_id": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "product_id": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "product": { "name": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "product_id": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.12.0-202303301557.p0.ge8e0600.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.12.0-202303301557.p0.g3ce7998.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.12.0-202303301557.p0.g3d08a74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "product": { "name": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "product_id": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "product": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "product": { "name": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "product_id": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "product_id": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.12.0-202303301557.p0.g5e2696b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "product": { "name": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "product_id": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "product": { "name": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "product_id": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.12.0-202303301557.p0.gbc2fa67.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "product_id": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "product": { "name": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "product_id": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "product": { "name": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "product_id": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "product_id": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.12.0-202303301557.p0.ga0f9090.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "product": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.12.0-202304031241.p0.ge8291b0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.12.0-202303301557.p0.g4cd14c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g5ff6387.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "product": { "name": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "product_id": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-contour-rhel8\u0026tag=v4.12.0-202303301557.p0.g45e9b62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.g20cffc0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "product_id": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "product": { "name": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "product_id": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "product_identification_helper": { "purl": "pkg:oci/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.12.0-202303301557.p0.g1c36ecd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product": { "name": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product_id": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065?arch=s390x\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product": { "name": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product_id": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "product": { "name": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "product_id": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g270d2eb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.12.0-202303301557.p0.g6ab8e62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.ga64bda3.assembly.stream" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "product": { "name": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "product_id": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.12.0-202303301557.p0.ge8e0600.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.12.0-202303301557.p0.g3ce7998.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product": { "name": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product_id": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product_id": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product_identification_helper": { "purl": "pkg:oci/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/cloud-event-proxy-rhel8\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.12.0-202303301557.p0.g3d08a74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "product": { "name": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "product_id": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "product_identification_helper": { "purl": "pkg:oci/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/dpu-network-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gbc123b4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.12.0-202303301557.p0.g6f976ac.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "product": { "name": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "product_id": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "product": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "product": { "name": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "product_id": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "product_id": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.12.0-202303301557.p0.g5e2696b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "product": { "name": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "product_id": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "product": { "name": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "product_id": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.12.0-202303301557.p0.gbc2fa67.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "product_id": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "product": { "name": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "product_id": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "product": { "name": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "product_id": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "product_id": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.12.0-202303301557.p0.ga0f9090.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "product": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.12.0-202304031241.p0.ge8291b0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "product_id": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel8\u0026tag=v4.12.0-202303301557.p0.ge59aa10.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "product_id": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gcc89dfb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.12.0-202303301557.p0.g4cd14c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g5ff6387.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "product": { "name": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "product_id": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-contour-rhel8\u0026tag=v4.12.0-202303301557.p0.g45e9b62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.g20cffc0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "product_id": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "product": { "name": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "product_id": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "product_identification_helper": { "purl": "pkg:oci/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.12.0-202303301557.p0.g1c36ecd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8\u0026tag=v4.12.0-202303301557.p0.g390c723.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g7ed738d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "product": { "name": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "product_id": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.12.0-202303301557.p0.g79f4296.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product": { "name": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product_id": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167?arch=amd64\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product": { "name": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product_id": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "product": { "name": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "product_id": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g270d2eb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "product": { "name": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "product_id": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.12.0-202303301557.p0.g6ab8e62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.ga64bda3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "product": { "name": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "product_id": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "product": { "name": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "product_id": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.12.0-202303301557.p0.gbf74bbd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.12.0-202303301557.p0.g21f48c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.12.0-202303301557.p0.g851a66b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "product_id": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "product_id": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64" }, "product_reference": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le" }, "product_reference": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x" }, "product_reference": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64" }, "product_reference": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64" }, "product_reference": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64" }, "product_reference": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le" }, "product_reference": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64" }, "product_reference": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64" }, "product_reference": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64" }, "product_reference": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le" }, "product_reference": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64" }, "product_reference": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x" }, "product_reference": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x" }, "product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le" }, "product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64" }, "product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64" }, "product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64" }, "product_reference": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le" }, "product_reference": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x" }, "product_reference": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64" }, "product_reference": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64" }, "product_reference": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64" }, "product_reference": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le" }, "product_reference": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" }, "product_reference": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64" }, "product_reference": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le" }, "product_reference": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x" }, "product_reference": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64" }, "product_reference": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64" }, "product_reference": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64" }, "product_reference": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le" }, "product_reference": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x" }, "product_reference": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64" }, "product_reference": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64" }, "product_reference": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le" }, "product_reference": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x" }, "product_reference": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64" }, "product_reference": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64" }, "product_reference": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le" }, "product_reference": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64" }, "product_reference": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x" }, "product_reference": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64" }, "product_reference": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le" }, "product_reference": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64" }, "product_reference": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x" }, "product_reference": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le" }, "product_reference": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64" }, "product_reference": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le" }, "product_reference": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64" }, "product_reference": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64" }, "product_reference": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x" }, "product_reference": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x" }, "product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le" }, "product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64" }, "product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64" }, "product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le" }, "product_reference": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64" }, "product_reference": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64" }, "product_reference": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64" }, "product_reference": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64" }, "product_reference": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le" }, "product_reference": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64" }, "product_reference": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le" }, "product_reference": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64" }, "product_reference": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le" }, "product_reference": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64" }, "product_reference": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" }, "product_reference": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23524", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-12-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2154200" } ], "notes": [ { "category": "description", "text": "A flaw was found in Helm, a tool for managing Charts, a pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to Uncontrolled Resource Consumption. Input to functions in the _strvals_ package could cause a stack overflow that is unrecoverable by Go. Applications that use functions from the _strvals_ package in Helm SDK may result in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: Denial of service through string value parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23524" }, { "category": "external", "summary": "RHBZ#2154200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23524", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23524" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23524", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23524" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r", "url": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-04-11T07:54:54+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1646" }, { "category": "workaround", "details": "SDK users can validate strings supplied by users that won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.", "product_ids": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: Denial of service through string value parsing" }, { "cve": "CVE-2022-23525", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-12-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2154202" } ], "notes": [ { "category": "description", "text": "A flaw was found in Helm. Applications that use the _repo_ package in Helm SDK to parse an index file may suffer a denial of service when that input causes a panic that cannot be recovered from. The Helm Client will panic with an index file that causes a memory violation panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: Denial of service through through repository index file", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has rated this a Moderate impact as Helm is a user utility, which when ran locally, interacts with the kubernetes API. As such, a panic in the Helm client does not constitute an availability impact to the rest of the system(s).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23525" }, { "category": "external", "summary": "RHBZ#2154202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23525", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23525" }, { "category": "external", "summary": "https://github.com/helm/helm/commit/638ebffbc2e445156f3978f02fd83d9af1e56f5b", "url": "https://github.com/helm/helm/commit/638ebffbc2e445156f3978f02fd83d9af1e56f5b" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-53c4-hhmh-vw5q", "url": "https://github.com/helm/helm/security/advisories/GHSA-53c4-hhmh-vw5q" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-04-11T07:54:54+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: Denial of service through through repository index file" }, { "cve": "CVE-2022-23526", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-12-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2154196" } ], "notes": [ { "category": "description", "text": "A flaw was found in Helm, a tool for managing Charts, a pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to NULL Pointer Dereference in the_chartutil_ package that could cause a segmentation violation. The _chartutil_ package contains a parser that loads a JSON Schema validation files into structures Go can work with. Some schema files can cause array data structures to be created, causing a memory violation. Applications that use the _chartutil_ package in the Helm SDK to parse a schema files may result in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: Denial of service through schema file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23526" }, { "category": "external", "summary": "RHBZ#2154196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154196" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23526" }, { "category": "external", "summary": "https://github.com/helm/helm/commit/bafafa8bb1b571b61d7a9528da8d40c307dade3d", "url": "https://github.com/helm/helm/commit/bafafa8bb1b571b61d7a9528da8d40c307dade3d" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-67fx-wx78-jx33", "url": "https://github.com/helm/helm/security/advisories/GHSA-67fx-wx78-jx33" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-04-11T07:54:54+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: Denial of service through schema file" } ] }
RHSA-2023:1646
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.12.11 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.11. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2023:1645\n\nSecurity Fix(es):\n\n* helm: Denial of service through string value parsing (CVE-2022-23524)\n\n* helm: Denial of service through through repository index file (CVE-2022-23525)\n\n* helm: Denial of service through schema file (CVE-2022-23526)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:1646", "url": "https://access.redhat.com/errata/RHSA-2023:1646" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "url": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html" }, { "category": "external", "summary": "2154196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154196" }, { "category": "external", "summary": "2154200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154200" }, { "category": "external", "summary": "2154202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1646.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.12.11 security update", "tracking": { "current_release_date": "2025-02-03T02:08:32+00:00", "generator": { "date": "2025-02-03T02:08:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.6" } }, "id": "RHSA-2023:1646", "initial_release_date": "2023-04-11T07:54:54+00:00", "revision_history": [ { "date": "2023-04-11T07:54:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-04-11T07:54:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-03T02:08:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.12", "product": { "name": "Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.12::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "product": { "name": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "product_id": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.12.0-202303301557.p0.ge8e0600.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.12.0-202303301557.p0.g3ce7998.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product": { "name": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product_id": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product_id": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/cloud-event-proxy-rhel8\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.12.0-202303301557.p0.g3d08a74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.12.0-202303301557.p0.g6f976ac.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "product": { "name": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "product_id": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "product": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "product": { "name": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "product_id": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "product_id": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.12.0-202303301557.p0.g5e2696b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "product": { "name": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "product_id": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "product": { "name": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "product_id": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.12.0-202303301557.p0.gbc2fa67.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "product_id": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "product": { "name": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "product_id": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "product": { "name": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "product_id": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "product_id": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.12.0-202303301557.p0.ga0f9090.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "product": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.12.0-202304031241.p0.ge8291b0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.12.0-202303301557.p0.g4cd14c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g5ff6387.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "product": { "name": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "product_id": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-contour-rhel8\u0026tag=v4.12.0-202303301557.p0.g45e9b62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.g20cffc0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "product_id": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "product": { "name": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "product_id": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "product_identification_helper": { "purl": "pkg:oci/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.12.0-202303301557.p0.g1c36ecd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8\u0026tag=v4.12.0-202303301557.p0.g390c723.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g7ed738d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "product": { "name": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "product_id": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.12.0-202303301557.p0.g79f4296.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product": { "name": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product_id": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product": { "name": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product_id": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "product": { "name": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "product_id": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g270d2eb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "product": { "name": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "product_id": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.12.0-202303301557.p0.g6ab8e62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.ga64bda3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "product": { "name": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "product_id": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "product": { "name": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "product_id": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.12.0-202303301557.p0.gbf74bbd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.12.0-202303301557.p0.g21f48c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.12.0-202303301557.p0.g851a66b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "product_id": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "product_id": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "product": { "name": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "product_id": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.12.0-202303301557.p0.ge8e0600.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.12.0-202303301557.p0.g3ce7998.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product": { "name": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product_id": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product_id": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product_identification_helper": { "purl": "pkg:oci/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/cloud-event-proxy-rhel8\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.12.0-202303301557.p0.g3d08a74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "product": { "name": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "product_id": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "product_identification_helper": { "purl": "pkg:oci/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/dpu-network-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gbc123b4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.12.0-202303301557.p0.g6f976ac.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "product": { "name": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "product_id": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "product": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "product": { "name": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "product_id": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "product_id": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.12.0-202303301557.p0.g5e2696b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "product": { "name": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "product_id": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "product": { "name": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "product_id": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.12.0-202303301557.p0.gbc2fa67.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "product_id": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "product": { "name": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "product_id": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "product": { "name": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "product_id": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "product_id": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.12.0-202303301557.p0.ga0f9090.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "product": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.12.0-202304031241.p0.ge8291b0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "product_id": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel8\u0026tag=v4.12.0-202303301557.p0.ge59aa10.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "product_id": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gcc89dfb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.12.0-202303301557.p0.g4cd14c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g5ff6387.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "product": { "name": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "product_id": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-contour-rhel8\u0026tag=v4.12.0-202303301557.p0.g45e9b62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.g20cffc0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "product_id": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "product": { "name": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "product_id": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "product_identification_helper": { "purl": "pkg:oci/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.12.0-202303301557.p0.g1c36ecd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "product": { "name": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "product_id": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.12.0-202303301557.p0.g79f4296.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product": { "name": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product_id": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905?arch=arm64\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product": { "name": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product_id": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "product": { "name": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "product_id": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g270d2eb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "product": { "name": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "product_id": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.12.0-202303301557.p0.g6ab8e62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.ga64bda3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64", "product": { "name": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64", "product_id": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "product": { "name": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "product_id": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.12.0-202303301557.p0.gbf74bbd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.12.0-202303301557.p0.g21f48c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.12.0-202303301557.p0.g851a66b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "product_id": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "product_id": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "product": { "name": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "product_id": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.12.0-202303301557.p0.ge8e0600.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.12.0-202303301557.p0.g3ce7998.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.12.0-202303301557.p0.g3d08a74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "product": { "name": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "product_id": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "product": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "product": { "name": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "product_id": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "product_id": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.12.0-202303301557.p0.g5e2696b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "product": { "name": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "product_id": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "product": { "name": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "product_id": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.12.0-202303301557.p0.gbc2fa67.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "product_id": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "product": { "name": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "product_id": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "product": { "name": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "product_id": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "product_id": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.12.0-202303301557.p0.ga0f9090.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "product": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.12.0-202304031241.p0.ge8291b0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.12.0-202303301557.p0.g4cd14c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g5ff6387.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "product": { "name": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "product_id": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-contour-rhel8\u0026tag=v4.12.0-202303301557.p0.g45e9b62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.g20cffc0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "product_id": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "product": { "name": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "product_id": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "product_identification_helper": { "purl": "pkg:oci/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.12.0-202303301557.p0.g1c36ecd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product": { "name": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product_id": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065?arch=s390x\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product": { "name": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product_id": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "product": { "name": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "product_id": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g270d2eb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.12.0-202303301557.p0.g6ab8e62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.ga64bda3.assembly.stream" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "product": { "name": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "product_id": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.12.0-202303301557.p0.ge8e0600.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.12.0-202303301557.p0.g3ce7998.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product": { "name": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product_id": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product_id": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product_identification_helper": { "purl": "pkg:oci/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/cloud-event-proxy-rhel8\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.12.0-202303301557.p0.g3d08a74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "product": { "name": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "product_id": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "product_identification_helper": { "purl": "pkg:oci/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/dpu-network-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gbc123b4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.12.0-202303301557.p0.g6f976ac.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "product": { "name": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "product_id": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "product": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "product": { "name": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "product_id": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "product_id": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.12.0-202303301557.p0.g5e2696b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "product": { "name": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "product_id": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "product": { "name": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "product_id": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.12.0-202303301557.p0.gbc2fa67.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "product_id": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "product": { "name": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "product_id": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "product": { "name": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "product_id": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "product_id": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.12.0-202303301557.p0.ga0f9090.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "product": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.12.0-202304031241.p0.ge8291b0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "product_id": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel8\u0026tag=v4.12.0-202303301557.p0.ge59aa10.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "product_id": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gcc89dfb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.12.0-202303301557.p0.g4cd14c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g5ff6387.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "product": { "name": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "product_id": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-contour-rhel8\u0026tag=v4.12.0-202303301557.p0.g45e9b62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.g20cffc0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "product_id": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "product": { "name": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "product_id": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "product_identification_helper": { "purl": "pkg:oci/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.12.0-202303301557.p0.g1c36ecd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8\u0026tag=v4.12.0-202303301557.p0.g390c723.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g7ed738d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "product": { "name": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "product_id": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.12.0-202303301557.p0.g79f4296.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product": { "name": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product_id": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167?arch=amd64\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product": { "name": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product_id": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "product": { "name": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "product_id": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g270d2eb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "product": { "name": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "product_id": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.12.0-202303301557.p0.g6ab8e62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.ga64bda3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "product": { "name": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "product_id": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "product": { "name": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "product_id": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.12.0-202303301557.p0.gbf74bbd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.12.0-202303301557.p0.g21f48c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.12.0-202303301557.p0.g851a66b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "product_id": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "product_id": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64" }, "product_reference": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le" }, "product_reference": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x" }, "product_reference": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64" }, "product_reference": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64" }, "product_reference": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64" }, "product_reference": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le" }, "product_reference": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64" }, "product_reference": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64" }, "product_reference": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64" }, "product_reference": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le" }, "product_reference": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64" }, "product_reference": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x" }, "product_reference": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x" }, "product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le" }, "product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64" }, "product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64" }, "product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64" }, "product_reference": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le" }, "product_reference": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x" }, "product_reference": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64" }, "product_reference": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64" }, "product_reference": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64" }, "product_reference": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le" }, "product_reference": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" }, "product_reference": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64" }, "product_reference": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le" }, "product_reference": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x" }, "product_reference": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64" }, "product_reference": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64" }, "product_reference": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64" }, "product_reference": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le" }, "product_reference": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x" }, "product_reference": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64" }, "product_reference": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64" }, "product_reference": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le" }, "product_reference": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x" }, "product_reference": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64" }, "product_reference": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64" }, "product_reference": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le" }, "product_reference": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64" }, "product_reference": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x" }, "product_reference": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64" }, "product_reference": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le" }, "product_reference": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64" }, "product_reference": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x" }, "product_reference": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le" }, "product_reference": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64" }, "product_reference": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le" }, "product_reference": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64" }, "product_reference": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64" }, "product_reference": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x" }, "product_reference": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x" }, "product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le" }, "product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64" }, "product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64" }, "product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le" }, "product_reference": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64" }, "product_reference": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64" }, "product_reference": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64" }, "product_reference": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64" }, "product_reference": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le" }, "product_reference": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64" }, "product_reference": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le" }, "product_reference": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64" }, "product_reference": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le" }, "product_reference": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64" }, "product_reference": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" }, "product_reference": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23524", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-12-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2154200" } ], "notes": [ { "category": "description", "text": "A flaw was found in Helm, a tool for managing Charts, a pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to Uncontrolled Resource Consumption. Input to functions in the _strvals_ package could cause a stack overflow that is unrecoverable by Go. Applications that use functions from the _strvals_ package in Helm SDK may result in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: Denial of service through string value parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23524" }, { "category": "external", "summary": "RHBZ#2154200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23524", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23524" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23524", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23524" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r", "url": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-04-11T07:54:54+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1646" }, { "category": "workaround", "details": "SDK users can validate strings supplied by users that won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.", "product_ids": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: Denial of service through string value parsing" }, { "cve": "CVE-2022-23525", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-12-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2154202" } ], "notes": [ { "category": "description", "text": "A flaw was found in Helm. Applications that use the _repo_ package in Helm SDK to parse an index file may suffer a denial of service when that input causes a panic that cannot be recovered from. The Helm Client will panic with an index file that causes a memory violation panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: Denial of service through through repository index file", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has rated this a Moderate impact as Helm is a user utility, which when ran locally, interacts with the kubernetes API. As such, a panic in the Helm client does not constitute an availability impact to the rest of the system(s).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23525" }, { "category": "external", "summary": "RHBZ#2154202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23525", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23525" }, { "category": "external", "summary": "https://github.com/helm/helm/commit/638ebffbc2e445156f3978f02fd83d9af1e56f5b", "url": "https://github.com/helm/helm/commit/638ebffbc2e445156f3978f02fd83d9af1e56f5b" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-53c4-hhmh-vw5q", "url": "https://github.com/helm/helm/security/advisories/GHSA-53c4-hhmh-vw5q" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-04-11T07:54:54+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: Denial of service through through repository index file" }, { "cve": "CVE-2022-23526", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-12-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2154196" } ], "notes": [ { "category": "description", "text": "A flaw was found in Helm, a tool for managing Charts, a pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to NULL Pointer Dereference in the_chartutil_ package that could cause a segmentation violation. The _chartutil_ package contains a parser that loads a JSON Schema validation files into structures Go can work with. Some schema files can cause array data structures to be created, causing a memory violation. Applications that use the _chartutil_ package in the Helm SDK to parse a schema files may result in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: Denial of service through schema file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23526" }, { "category": "external", "summary": "RHBZ#2154196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154196" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23526" }, { "category": "external", "summary": "https://github.com/helm/helm/commit/bafafa8bb1b571b61d7a9528da8d40c307dade3d", "url": "https://github.com/helm/helm/commit/bafafa8bb1b571b61d7a9528da8d40c307dade3d" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-67fx-wx78-jx33", "url": "https://github.com/helm/helm/security/advisories/GHSA-67fx-wx78-jx33" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-04-11T07:54:54+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: Denial of service through schema file" } ] }
rhsa-2023_1646
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.12.11 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.11. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2023:1645\n\nSecurity Fix(es):\n\n* helm: Denial of service through string value parsing (CVE-2022-23524)\n\n* helm: Denial of service through through repository index file (CVE-2022-23525)\n\n* helm: Denial of service through schema file (CVE-2022-23526)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:1646", "url": "https://access.redhat.com/errata/RHSA-2023:1646" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "url": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html" }, { "category": "external", "summary": "2154196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154196" }, { "category": "external", "summary": "2154200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154200" }, { "category": "external", "summary": "2154202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154202" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1646.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.12.11 security update", "tracking": { "current_release_date": "2024-11-22T22:36:09+00:00", "generator": { "date": "2024-11-22T22:36:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:1646", "initial_release_date": "2023-04-11T07:54:54+00:00", "revision_history": [ { "date": "2023-04-11T07:54:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-04-11T07:54:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T22:36:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.12", "product": { "name": "Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.12::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "product": { "name": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "product_id": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.12.0-202303301557.p0.ge8e0600.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.12.0-202303301557.p0.g3ce7998.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product": { "name": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product_id": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product_id": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/cloud-event-proxy-rhel8\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.12.0-202303301557.p0.g3d08a74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.12.0-202303301557.p0.g6f976ac.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "product": { "name": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "product_id": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "product": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "product": { "name": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "product_id": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "product_id": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.12.0-202303301557.p0.g5e2696b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "product": { "name": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "product_id": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "product": { "name": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "product_id": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.12.0-202303301557.p0.gbc2fa67.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "product_id": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "product": { "name": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "product_id": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "product": { "name": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "product_id": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "product_id": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.12.0-202303301557.p0.ga0f9090.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "product": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.12.0-202304031241.p0.ge8291b0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.12.0-202303301557.p0.g4cd14c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g5ff6387.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "product": { "name": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "product_id": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-contour-rhel8\u0026tag=v4.12.0-202303301557.p0.g45e9b62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.g20cffc0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "product_id": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "product": { "name": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "product_id": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "product_identification_helper": { "purl": "pkg:oci/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.12.0-202303301557.p0.g1c36ecd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8\u0026tag=v4.12.0-202303301557.p0.g390c723.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g7ed738d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "product": { "name": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "product_id": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.12.0-202303301557.p0.g79f4296.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product": { "name": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product_id": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product": { "name": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product_id": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "product": { "name": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "product_id": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g270d2eb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "product": { "name": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "product_id": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.12.0-202303301557.p0.g6ab8e62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.ga64bda3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "product": { "name": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "product_id": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "product": { "name": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "product_id": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.12.0-202303301557.p0.gbf74bbd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.12.0-202303301557.p0.g21f48c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.12.0-202303301557.p0.g851a66b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "product_id": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "product_id": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "product": { "name": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "product_id": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.12.0-202303301557.p0.ge8e0600.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.12.0-202303301557.p0.g3ce7998.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product": { "name": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product_id": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product_id": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "product_identification_helper": { "purl": "pkg:oci/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/cloud-event-proxy-rhel8\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.12.0-202303301557.p0.g3d08a74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "product": { "name": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "product_id": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "product_identification_helper": { "purl": "pkg:oci/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/dpu-network-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gbc123b4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.12.0-202303301557.p0.g6f976ac.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "product": { "name": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "product_id": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "product": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "product": { "name": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "product_id": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "product_id": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.12.0-202303301557.p0.g5e2696b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "product": { "name": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "product_id": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "product": { "name": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "product_id": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.12.0-202303301557.p0.gbc2fa67.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "product_id": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "product": { "name": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "product_id": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "product": { "name": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "product_id": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "product_id": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.12.0-202303301557.p0.ga0f9090.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "product": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.12.0-202304031241.p0.ge8291b0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "product_id": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel8\u0026tag=v4.12.0-202303301557.p0.ge59aa10.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "product_id": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gcc89dfb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.12.0-202303301557.p0.g4cd14c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g5ff6387.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "product": { "name": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "product_id": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-contour-rhel8\u0026tag=v4.12.0-202303301557.p0.g45e9b62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.g20cffc0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "product_id": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "product": { "name": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "product_id": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "product_identification_helper": { "purl": "pkg:oci/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.12.0-202303301557.p0.g1c36ecd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "product": { "name": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "product_id": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.12.0-202303301557.p0.g79f4296.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product": { "name": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product_id": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905?arch=arm64\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product": { "name": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product_id": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "product": { "name": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "product_id": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g270d2eb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "product": { "name": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "product_id": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.12.0-202303301557.p0.g6ab8e62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.ga64bda3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64", "product": { "name": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64", "product_id": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "product": { "name": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "product_id": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.12.0-202303301557.p0.gbf74bbd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.12.0-202303301557.p0.g21f48c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.12.0-202303301557.p0.g851a66b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "product_id": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "product_id": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "product": { "name": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "product_id": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.12.0-202303301557.p0.ge8e0600.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.12.0-202303301557.p0.g3ce7998.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.12.0-202303301557.p0.g3d08a74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "product": { "name": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "product_id": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "product": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "product": { "name": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "product_id": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "product_id": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.12.0-202303301557.p0.g5e2696b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "product": { "name": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "product_id": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "product": { "name": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "product_id": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.12.0-202303301557.p0.gbc2fa67.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "product_id": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "product": { "name": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "product_id": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "product": { "name": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "product_id": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "product_id": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.12.0-202303301557.p0.ga0f9090.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "product": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.12.0-202304031241.p0.ge8291b0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.12.0-202303301557.p0.g4cd14c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g5ff6387.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "product": { "name": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "product_id": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-contour-rhel8\u0026tag=v4.12.0-202303301557.p0.g45e9b62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.g20cffc0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "product_id": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "product": { "name": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "product_id": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "product_identification_helper": { "purl": "pkg:oci/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.12.0-202303301557.p0.g1c36ecd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product": { "name": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product_id": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065?arch=s390x\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product": { "name": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product_id": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "product": { "name": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "product_id": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g270d2eb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.12.0-202303301557.p0.g6ab8e62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.ga64bda3.assembly.stream" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "product": { "name": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "product_id": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.12.0-202303301557.p0.ge8e0600.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "product": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "product_id": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node-problem-detector-rhel8\u0026tag=v4.12.0-202303301557.p0.g3ce7998.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product": { "name": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product_id": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product_id": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "product_identification_helper": { "purl": "pkg:oci/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/cloud-event-proxy-rhel8\u0026tag=v4.12.0-202303301557.p0.gd210c22.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "product": { "name": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "product_id": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-operator\u0026tag=v4.12.0-202303301557.p0.g3d08a74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "product": { "name": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "product_id": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "product_identification_helper": { "purl": "pkg:oci/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/dpu-network-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gbc123b4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "product": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "product_id": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni\u0026tag=v4.12.0-202303301557.p0.g6f976ac.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "product": { "name": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "product_id": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "product": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "product_id": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g3c81f59.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "product": { "name": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "product_id": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "product": { "name": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "product_id": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-operator\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "product": { "name": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "product_id": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery\u0026tag=v4.12.0-202303301557.p0.g5e2696b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "product": { "name": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "product_id": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "product": { "name": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "product_id": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.12.0-202303301557.p0.gbc2fa67.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "product_id": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "product": { "name": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "product_id": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "product": { "name": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "product_id": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-helm-operator\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "product": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "product_id": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel8\u0026tag=v4.12.0-202303301557.p0.ge11bcad.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "product": { "name": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "product_id": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-idler-rhel8\u0026tag=v4.12.0-202303301557.p0.ga0f9090.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "product": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "product_id": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8\u0026tag=v4.12.0-202304031241.p0.ge8291b0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "product_id": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel8\u0026tag=v4.12.0-202303301557.p0.ge59aa10.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "product_id": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gcc89dfb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product_id": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product_id": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.gda308c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8\u0026tag=v4.12.0-202303301557.p0.g4cd14c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "product_id": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g5ff6387.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "product": { "name": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "product_id": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-contour-rhel8\u0026tag=v4.12.0-202303301557.p0.g45e9b62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.g20cffc0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "product_id": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.12.0-202303301557.p0.g7e8a010.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "product": { "name": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "product_id": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "product_identification_helper": { "purl": "pkg:oci/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/frr-rhel8\u0026tag=v4.12.0-202303301557.p0.g1c36ecd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8\u0026tag=v4.12.0-202303301557.p0.g390c723.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g7ed738d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "product": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "product_id": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator\u0026tag=v4.12.0-202303311342.p0.gdf50159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "product": { "name": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "product_id": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp\u0026tag=v4.12.0-202303301557.p0.g79f4296.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "product_id": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8\u0026tag=v4.12.0-202303301557.p0.gbc3f9b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product": { "name": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product_id": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167?arch=amd64\u0026repository_url=registry.redhat.io/openshift-tech-preview/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product": { "name": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product_id": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8\u0026tag=v4.12.0-202303301557.p0.ga917ee0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "product": { "name": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "product_id": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.g270d2eb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "product": { "name": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "product_id": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-operator\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8\u0026tag=v4.12.0-202303301557.p0.g6ab8e62.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator\u0026tag=v4.12.0-202303301557.p0.ga64bda3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "product": { "name": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "product_id": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel8\u0026tag=v4.12.0-202303301557.p0.gc0bdc7c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "product": { "name": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "product_id": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.12.0-202303301557.p0.gbf74bbd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.12.0-202303301557.p0.g21f48c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "product": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "product_id": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.12.0-202303301557.p0.g851a66b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "product": { "name": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "product_id": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-operator\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "product": { "name": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "product_id": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook\u0026tag=v4.12.0-202303301557.p0.g11d72c5.assembly.stream" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64" }, "product_reference": "openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le" }, "product_reference": "openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x" }, "product_reference": "openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64" }, "product_reference": "openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64" }, "product_reference": "openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64" }, "product_reference": "openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le" }, "product_reference": "openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64" }, "product_reference": "openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64" }, "product_reference": "openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64" }, "product_reference": "openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le" }, "product_reference": "openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64" }, "product_reference": "openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x" }, "product_reference": "openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x" }, "product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le" }, "product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64" }, "product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64" }, "product_reference": "openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64" }, "product_reference": "openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le" }, "product_reference": "openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x" }, "product_reference": "openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64" }, "product_reference": "openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le" }, "product_reference": "openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64" }, "product_reference": "openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64" }, "product_reference": "openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le" }, "product_reference": "openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" }, "product_reference": "openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64" }, "product_reference": "openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le" }, "product_reference": "openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x" }, "product_reference": "openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64" }, "product_reference": "openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64" }, "product_reference": "openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64" }, "product_reference": "openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le" }, "product_reference": "openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x" }, "product_reference": "openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64" }, "product_reference": "openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64" }, "product_reference": "openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le" }, "product_reference": "openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64" }, "product_reference": "openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64" }, "product_reference": "openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x" }, "product_reference": "openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64" }, "product_reference": "openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64" }, "product_reference": "openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le" }, "product_reference": "openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64" }, "product_reference": "openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x" }, "product_reference": "openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64" }, "product_reference": "openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le" }, "product_reference": "openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64" }, "product_reference": "openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x" }, "product_reference": "openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le" }, "product_reference": "openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64" }, "product_reference": "openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le" }, "product_reference": "openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64" }, "product_reference": "openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64" }, "product_reference": "openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x" }, "product_reference": "openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64" }, "product_reference": "openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x" }, "product_reference": "openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64" }, "product_reference": "openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64" }, "product_reference": "openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x" }, "product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le" }, "product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64" }, "product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64" }, "product_reference": "openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x" }, "product_reference": "openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le" }, "product_reference": "openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64" }, "product_reference": "openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64" }, "product_reference": "openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64" }, "product_reference": "openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64" }, "product_reference": "openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le" }, "product_reference": "openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x" }, "product_reference": "openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64" }, "product_reference": "openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le" }, "product_reference": "openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64" }, "product_reference": "openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64" }, "product_reference": "openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64" }, "product_reference": "openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64" }, "product_reference": "openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le" }, "product_reference": "openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64" }, "product_reference": "openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" }, "product_reference": "openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64", "relates_to_product_reference": "8Base-RHOSE-4.12" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23524", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-12-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2154200" } ], "notes": [ { "category": "description", "text": "A flaw was found in Helm, a tool for managing Charts, a pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to Uncontrolled Resource Consumption. Input to functions in the _strvals_ package could cause a stack overflow that is unrecoverable by Go. Applications that use functions from the _strvals_ package in Helm SDK may result in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: Denial of service through string value parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23524" }, { "category": "external", "summary": "RHBZ#2154200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23524", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23524" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23524", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23524" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r", "url": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-04-11T07:54:54+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1646" }, { "category": "workaround", "details": "SDK users can validate strings supplied by users that won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.", "product_ids": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: Denial of service through string value parsing" }, { "cve": "CVE-2022-23525", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-12-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2154202" } ], "notes": [ { "category": "description", "text": "A flaw was found in Helm. Applications that use the _repo_ package in Helm SDK to parse an index file may suffer a denial of service when that input causes a panic that cannot be recovered from. The Helm Client will panic with an index file that causes a memory violation panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: Denial of service through through repository index file", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has rated this a Moderate impact as Helm is a user utility, which when ran locally, interacts with the kubernetes API. As such, a panic in the Helm client does not constitute an availability impact to the rest of the system(s).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23525" }, { "category": "external", "summary": "RHBZ#2154202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23525", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23525" }, { "category": "external", "summary": "https://github.com/helm/helm/commit/638ebffbc2e445156f3978f02fd83d9af1e56f5b", "url": "https://github.com/helm/helm/commit/638ebffbc2e445156f3978f02fd83d9af1e56f5b" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-53c4-hhmh-vw5q", "url": "https://github.com/helm/helm/security/advisories/GHSA-53c4-hhmh-vw5q" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-04-11T07:54:54+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: Denial of service through through repository index file" }, { "cve": "CVE-2022-23526", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-12-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2154196" } ], "notes": [ { "category": "description", "text": "A flaw was found in Helm, a tool for managing Charts, a pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to NULL Pointer Dereference in the_chartutil_ package that could cause a segmentation violation. The _chartutil_ package contains a parser that loads a JSON Schema validation files into structures Go can work with. Some schema files can cause array data structures to be created, causing a memory violation. Applications that use the _chartutil_ package in the Helm SDK to parse a schema files may result in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: Denial of service through schema file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "known_not_affected": [ "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift-tech-preview/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/cloud-event-proxy-rhel8@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:546bb310a9fede34acf441cf3a7811da23499e8ff64494d6ebab610d4fd070da_amd64", "8Base-RHOSE-4.12:openshift4/dpu-network-rhel8-operator@sha256:b347c006cc1f9edcc141f4d734ea6e55318625ec67e785c8816a7d9f7329251e_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:2d68f585eecb10124b20d1541b86ccfb5fcc51b8ba2482e6917657ca5aa74443_amd64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:5617ff1836a11ffafe025ecc3c01c0febfcf4376810ce64d76aa6c4e789d6671_ppc64le", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:7c90b6c83db41f181a87e37e6eb7ce7ec87f04f2b57c270fcac8a1d9e7d72821_arm64", "8Base-RHOSE-4.12:openshift4/frr-rhel8@sha256:aef02f93b084a70836e66e8bada38a5ddeef3d423b3e609f4c135a12bfcb2891_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:442e1bb6c1436d45511b039f14bef927423acf61c7154f9757ffa94fb215d657_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:76afcaaf010cbc586c7316b3e62140168ada00de3a09675819baad26b31fb7b6_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:8cd003aa8a7d21d2a7b9b6015a39269c2d1e33327bc8f6bfc37f7e40eb6d9329_arm64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall-rhel8-operator@sha256:e85bc96ede44c517c2f08431536353f5011c56ecfa5ab65e2a546143bef38b81_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:2a1ee88272b2055ebf89ba07c7ff5119f5fc8709919d212b453071f6f1f7e0ce_amd64", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:5515b9d693c38409a833344f68ff984f6afda8e22010221c670fac661ad61ec2_ppc64le", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:e119752bfe9f3c18c05390f717320754ebf8da560e03a24261d2e05821d4ea8f_s390x", "8Base-RHOSE-4.12:openshift4/ingress-node-firewall@sha256:ec75b336be4e617d108cc62b85ed9d4f9cef072e370f33692bb320203a4f81a1_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:7a6e437f13b97bb8242896638ab58da64798caf5b7cd3a45e89035950cc0ce44_amd64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:8a5fd81be838a502b96965c094717d1409a5c3d5961e52653a90ee1c61ac6e11_arm64", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:d2e4112b19550688c39ab618f4e9982c747f9398a8e3d20bb7869c64a3b6aa25_s390x", "8Base-RHOSE-4.12:openshift4/kubernetes-nmstate-rhel8-operator@sha256:f70ac9bded108b561130e2c85b307f443f91ae2de3593a20f161bf35e2863ee5_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:67529d6f0993ceab25b0a4dffb4615a12c3d630059e066e1d2ccf917a903a905_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:7941c0e174eb643bb466a933619145ffd3e789707505d7d724f9540e2d062f4f_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:799089906f62d5b9671e3a5760132e8caa1d1639f93eb72f13d1c2ab2e719065_s390x", "8Base-RHOSE-4.12:openshift4/metallb-rhel8@sha256:b65f91a7ec161354540a4e59b71fc942fef2d82c0cf4a1d7a3b97f7c8f352167_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:5283e4f43c6e345820aaaa76fe3b844a571eaac40ff822b398850139e6e36b00_amd64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:9b926e70f1580f8b52475686c7a86a841ba23d7e6d31a3ca53692cdb501607cc_arm64", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:a2b0b2bcc9571cd2fba76de149f6731087be9e6510d56e3fa2f76e480755b9c5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ansible-operator@sha256:c5161d331d4af4cb8f061ab05ef16d4700578060c358dc85f86d8256320259bd_s390x", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:09cd7abee9c77c58090173a6acc2c3390bda2da6b7d97a9ec7e62f9edd2a7e41_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-container-rhel8@sha256:20269e78023a9204db8ada903e27abffbf0170a2b27f8eb05d278eaef51a432d_amd64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:4c4fa5e725f3272a57c88e989ea7df37f74fce9e0abd601a668a0a75f884d1d6_arm64", "8Base-RHOSE-4.12:openshift4/ose-aws-efs-csi-driver-rhel8-operator@sha256:d1ff7ae7b151424d4eecb9c1836db6c50e7a9c0ad005d1a2fc9ab0f3538b01e0_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:1c4523a8b2b85be0d054c9cf939de2410a071d036b7b0fc88b425cd3e4586a4b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:90d36eac4bd83bdd16911998dcf5ea8c075af4cb77cf1cb6ecf2ec459a79c1be_arm64", "8Base-RHOSE-4.12:openshift4/ose-cloud-event-proxy@sha256:b54b60b819d944702dc24184181e1bb7015d8c5a6fe5db2d518843842c415949_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:1271cec9bd04c72cef2878c18b3da2c101e9c855c4d432683091f63ee5664601_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:29fbd5d304ebbba428a433ffcc1a28bc6370822ad4d4d2a6ebc9d7920e2e9bb3_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:41c1ba188b00f96f8806a33fa0e74e757eb0a1f106aceabdaf9a5a41f460a53b_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-capacity@sha256:a841eb482194e05f4173c4e3288ed976d00453f9212733b83e0c6719dd65838d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:06aebb676ce8605b297df26cfec65e48922f6c89544613c33e0d8edb0dfd1442_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:0f6d4f90854f065f47bd44c81f639580156e6bfb0b870fc1d2539448e06faaec_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:4240e87d62605fa70fcace5c35eb7d5ca0e41c6a11a3ad53371a02a3a9d101bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-kube-descheduler-rhel8-operator@sha256:c1fe81f151cbf962594d46759426f063d7f2bfb8281de45658d0ecc9ee8aec25_amd64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:49e944af0e7bc8ee49c0db0a7b3b3b7756c9fbbe6309394144333dd078493bde_s390x", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:8d750595cef2226dc03e12bf14dbcfbcdf53ab28020ad6cf784124d2959276ab_arm64", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:9cf40830e30d6f08d649314a28dc580d07428c0861e8f9ab80e04370c40192f3_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-cluster-nfd-operator@sha256:f1d21d47a8352d4a08a7f99552f54fe1d6bad1297fdd3e7fdec0155ae2f9e55f_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:34d17122e5cb42d697826867d33c96df8f5f9e1f53ebf9f58b9b6fcd58350bd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:76048bc1bf668abf1d4e11adfb5831f4cf9a441494c9830e0c46655721c43d4d_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:9b0b8ddb6a08da85db811714dd4c2db73a35a62bc15f74a84e290ae928ab2c42_arm64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8-operator@sha256:d2a443c601db66ca306efde0f04228efd60b8507aaa30fb0edfa270375f2cd15_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:0b2c999a759e70b51ae08a45e7610756cb8060566f38f320aeb8747550250193_amd64", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:16908b5c3388e9920c159ab49f764599742f39b56210ca1f73acb6ec4b1e29dd_s390x", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3594f66d6be8162d93bcaae8f7985b33bf23066202934c5df389b7c7218c4b2e_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-clusterresourceoverride-rhel8@sha256:3ee76acbc5998c1e6742585b114720bbf50e85d35869212d615d9326fd714c37_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:00a53377a28cfc33927a22529185f63b194d24756f110a63ebfce0cf08ca3efc_s390x", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:7cb2aed62097677e36b71cfd4bc69e29484ae7d81e1e5d095dcddf2f5b611ffe_arm64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:9414608fc2f84f4fff977682d3aab381ea3b3ac9d75895b61372582e772280a0_amd64", "8Base-RHOSE-4.12:openshift4/ose-contour-rhel8@sha256:f6e9ad1e1abd2b7a63059f2d05171a75e64aef85e58fb09c86e286d4016d9ef4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:2ccfc3add6cb2229712dc61e8a4d31ce7ed1c97f9e533bb2728da5394c2036cc_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:49b54276d945e5c2248936648a4966458ab6063b28f5a84b0f3adfb32c1e22a3_arm64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:b8ae2a8233aab72cf6050b99ee4a996ce50e4550aab466a6ebadd8a228137dc5_amd64", "8Base-RHOSE-4.12:openshift4/ose-csi-driver-shared-resource-mustgather-rhel8@sha256:d118820505ed69671c169b245123773b97f8d1ce2920151d7e5b0e742c2eacfb_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:220e0201b92ac70abd8a9dfa527ddf8dbe685d9d14694a1221d169b84ef10450_arm64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:4f7e9375e3e8d6bbee6f80aaf6bec72cc20883df7917cf57812080e7aed52c80_s390x", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:5e7da0d7f51863377ee3994565cb6d29fbe5166f01613e2b9156698e9ba9e617_amd64", "8Base-RHOSE-4.12:openshift4/ose-descheduler@sha256:608880aacc1cea01270ba24b10fbb6ab9e9ca5e6bd1507b63de17d8d81aeefd5_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:481ae35daf1e03c0b6f155236ba7bcab4ce1d2be98194373d3eb6d9df27367a7_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:7467c68aea71c190c69b79a6fad174a52dd6b7059b97f3a9ea1b7681d19717d2_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:bb3710b73e395c39735307f783e7474d2ed9bc88dc6317468783170340cdf3c6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-dns-proxy@sha256:ce7b4f8e284a278dc53f32e40c5a728449d482f8f2f3a4b9b7c1fca2f697833e_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:25a67b085e02a9a25dfc0e4100131b8b64903065b2bf9d165cd0ad52c206b59d_arm64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:33ce84348a85bbe280061417c9ed865c1f7f44adbd333ee21770aa03d2dca310_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:4c4e4f630c0441004fcde6f53d0190542dfbec3ff6bea6ddb0381be9530d350b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-http-proxy@sha256:d7bbade49eafd8caf98fecfd9d950d4c19f19a53cf59ee49c79951c505748e32_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:0ad00c8e363a482dd0c4f9c778f93b1114752ca41e8971a20e83248e9a58edbe_amd64", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:3ac0007c2d9ce448b6163cef66fbc3a68183b4616e8f303de38c650232b77b60_s390x", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:a32740b479106a60b20818e2b4d66667f30d6af256bc3b789a91ff2eba43deb0_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-egress-router@sha256:aa8c7396637c2eda3ec76e293c2393995462a5109b99723ada7f6352f0f3705c_arm64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:aa91781e09a427599804dfc5505a4ee391902c6b0bd5ce7ddf63219bd96a4065_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8-operator@sha256:e6465152554246caa95da8b634de354243a1a6ed4de8936ff0aca0c3dcd70c12_amd64", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:1d14832bf93c9407639db875ec4a7de763322b12c8a42dfd9816afa8758d7c1d_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-gcp-filestore-csi-driver-rhel8@sha256:4443976ecb48a72934fdf99ddf5ee12290b83a491ae82ff51e800d0e4761a0e1_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:493137835194a23d178b3540566222ec984218cc5fa7a1a7d5e41989849dfcfb_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8075c6d2c22cea22df8c38e9d95c092e6240d6c45568542f673c66db430058d1_arm64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:8aefab72dd8f804092a1790edcefde9f73d686a5a43c7c97d282bdbe751362ca_amd64", "8Base-RHOSE-4.12:openshift4/ose-helm-operator@sha256:d66c83f5a2cf7576090ea186ec170f452db140c719d7007ea2d947f0a9944151_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:3b37adcd960328549a05c79871f5f0a46acbc0a54dfa328ebe9a7c78b7978cab_arm64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:59187afbeaaf60d6b3a34afc2350190bf99f437bcd8d0d6f64dca5ccd78143c8_s390x", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:6831cccfe22f79dbbf0faf78571a74b5e9cfbc30756c020da983a2f511f17fd9_amd64", "8Base-RHOSE-4.12:openshift4/ose-kubernetes-nmstate-handler-rhel8@sha256:7076d6cd84e9ed0cae7f19cac8f6ea472782a193a7dc3046586d2149865b761b_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:12be8d7c6b7b266970e1cadaab96d38e33dd0c326da9361b5e97b23e1a194cb1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:7a1a7c309ad2640291102cc95c3e2baf85f7c3e679ee88d69cb0425476a1bacd_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:bb64cd62b0d7b33761e162923c5d207f30e36270a89a50039c78fb45328de0cc_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-diskmaker@sha256:d09de8f51996af6a6507f1b20d1e536c1ca188079c1cd986b7ea8072bebcaff2_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:771f9d88fba3eed20dd1e3c24168b91be7fd4f8dc250fa4b3c1fb82f42848ee1_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:7b305edde576586951ba0f1552288f87ec2b61ff364c1ec550de29c2d8fb9e3d_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:8e65e4e8c13b534e538c149c668ad47178144ca4f9c09b6dd20f3449b2af1ac1_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-mustgather-rhel8@sha256:ea655624dbeaa3a53a85cafebd886e822e4d04b0c0a5a26a7ae856ec2f4eb589_s390x", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:02c83f30502c67b9567d64f3687458db7cda3b0d14238b8965cb0653f0c3af20_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:2c090cd9dc3bd2aed61391ea99e1a97983be7f958c03e06042a8d69845f0848e_amd64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:8ca870353119f74c8e031324b9e99257bf10016f33cfd759c4babd345b088f81_arm64", "8Base-RHOSE-4.12:openshift4/ose-local-storage-operator@sha256:a90eb5fa7786e68804f9811080ae04ee00df43e1c28e22f9ac9c5c6d4a60a89b_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:0628f98436dcfbfb18fde8b77c898ce46f4ef0c331691fb879038e021190c19b_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:9df8d0eeed0c4571992675383dce662c40f01c5a06780537fedbc1c304ab8be4_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:ae01ade035bf12a533106ea6c8e2fd869beef43aa95b8da732e5f1d5df33bbf2_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-feature-discovery@sha256:aed7588629d7aaa4f00fb4ff8442c59479042059c4b58e7c7f7f254bc36aae1b_amd64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:68c28a47dd1cba190ed008fb4f5207d2eda915537c07ff454692bf7cf568cdf6_arm64", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:a9fdfdd50a95f025d1bf66980031d71927d8da8cf40137449e0922f3acf18644_s390x", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:c630a7506d8295a9858c804a6d2481f9512fa5232655fc15644c1054aaa620dd_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-node-problem-detector-rhel8@sha256:ce67f36a12676adc3d55e7c7695bdf12a18aae6aca731ed1d627fadc116418e8_amd64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:0ef51968a889311214cb740c1fba0e8fc9d75ec08778f2e9f792b441092f88ad_s390x", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:420f4be14420093a43ec4bf2f972c9287fda054ba13503e6e087a42b4079a426_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:478ca451f376acedb673388e2eff471b943386a943f38e87728728dd70abf4bd_arm64", "8Base-RHOSE-4.12:openshift4/ose-openshift-proxy-pull-test-rhel8@sha256:625a51138e8ae112b6cd49be29e6dd6873f65d7a189a4e4a801a738a2c57b744_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:698774bec985b893379afef38a9b1b44aa8841927619be4ec8f32208033b90d9_amd64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:906c7ad289132564b1d6ca1568cef787e222dd7343ff427216d7648ef63df358_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:d1a5ab843062ed7e4eb8e75d66190de7077bfa46a7405d2f17c01f8ce5c2cad4_arm64", "8Base-RHOSE-4.12:openshift4/ose-operator-sdk-rhel8@sha256:f8d15fe192b93c8741a593899e785d57319986f10677f7b339379d8fa7dd4699_s390x", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:25ef32ebe0f1f3f81d0090218a33885d2502132b0e9c9c405f5ba04e7d5dd1c8_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:3f2e2d2b6bfcfe568b7b94cc1c07438205acf5f4fa7b37ab4ae253d36b75f951_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp-operator@sha256:e883540e1155044415d2983bd5363a7f9bb5b6bfd24c64af0eaa42fc6290e12b_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:4e9dd768e1a6603b974c912f6d51d2dcbf5ce8a746637421fe3459c5cffeab46_amd64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:7310e67c5916abc0fdb53b0cb13829aa81b837b4d849d637bc466389659cfa9d_arm64", "8Base-RHOSE-4.12:openshift4/ose-ptp@sha256:e14e1b6531160aa715dbd3314db759271096fb5e9a9c4d63c2de707176cf9974_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:0f1665b2ce19a23d1348f8fac589c9f4f0f73005987d99a9c3febf87a372d265_arm64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:6e26583cd201b90b780a61bd7b8578a7f8dd7ca8d5965cc0db6011d85ff9c885_amd64", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:746b444cc0ae4cfe6af6ece01b86ef09cead7a2db0fbdaba3613102605db9f54_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-service-idler-rhel8@sha256:76f35dad1e143292f60e3c727455d2d52376bf9b825beeb4d588cc13753f24fc_s390x", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:a6b452096134ada77fa254554ce214691f2dd3389bceb9f84a2bd946eacb5265_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:aa2a222bd5bbc44f71a90d64e45c27370543638467cd80770e90d303563c8728_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-cni@sha256:f3889964c02d0f45549fb86e36e8dbbcbec9477953438217f0c3270b365883d5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:792d2e2145ac24a96ac7014cf62a008f8447ab5c2ff2a152d21a0da2ee1d1552_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:a507feab497ef6bf72334095eb7fe990b79214ee8a6f99b39c8c9a39da18693f_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-dp-admission-controller@sha256:d2aff0e39171753174b42ad083d994031adf8609fbd23c89ba6871b2ee9a4fd5_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:24f5dfd7e42713b3e6d89ccc1bc86d7741efec276cd5e69f46cc419b864688d9_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:6b41327976cc1ed72ff593c9a7f8e73bd298b8a4dd085ad5d80f4f913f81fccd_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-infiniband-cni@sha256:eea6c71f9c5512cb63edbaa4a02065a92b26babe07e50dcbe2c1f3ae3e173f4d_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:c90a062128b5ffe61c55b7b711220bfc80d1a2b27f3ae60d383de181e323ad00_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:d0ec8886b34cd5747b7e521b8fdac6f92dbd7c51a061f6d2595dc353993f488e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-config-daemon@sha256:fc4be8d1c124992ad8a001bc4165684e408818a0d3d55939e810567cae4e2f73_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:62456b528116b8f5b6e6a98f7c23d67a57569959a425ca976de53db7655f5945_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:cc5bc2c693cf603aade5ebcca022bade292d73ac0085b5489dff19828318577f_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-device-plugin@sha256:e0c763cecd9a41bac773fe13caedc41010ac7a65a7f8685d064a736b78bedab0_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:2b27ada10ab88a76ae27b2409a4447d5e54cc42dc306a3aca29063ef030b2b3a_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:3a6ba36ba5680017e35829b993d9d7002ebe477c3758321b7aea8b396fb7620b_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-operator@sha256:776b05ef53fb4eba33539808cfce0f9a38ff7a279751e9495b1f5763e4b7c4c6_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:2470cc4c171a14e1f2a38e331e7c55fd591931b4dff6bd32d7d06bdf8b11857e_arm64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:a964bb935d3ebfd5cd8552884fc582f095f67872e5a90a1c93333bd005b95b08_amd64", "8Base-RHOSE-4.12:openshift4/ose-sriov-network-webhook@sha256:c0db9b8b700989c0c7eaa2d6489b24023d0f15729bc8a43db05eb307b25ad129_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:344e1092066e9ad0758e68b09373e1585784e6f4ffe8d0d4475bcf3c524a8d08_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:42335863691ab1c7a6690927bb390670c1a06d360fb504ea657056fb0505ace9_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:6c6fc5f6783c042f6c8aff5a7136e4694881283708ba79a578a1be4aa96522de_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8-operator@sha256:8d5e75e3f3eddbbbc2a413f4be77e13099e314212a79143c461404de815370d6_ppc64le", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:196798b1595e612663916674fcfc4feb6a36c90b7fcdd982fe67cc851784a507_arm64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:63643dc69a88b9f2a410403583e1468bc34c9606674d066d382c9f8f48b03b3a_amd64", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:8d895412ac58269ce482f5e417cee87f2c72b119932ae83c6f475434d34b3261_s390x", "8Base-RHOSE-4.12:openshift4/ose-vertical-pod-autoscaler-rhel8@sha256:b8ca711d6c25b7d7d558f88ce81ae1ef4d19cb9ef02e3b8b353835e302fb4c02_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:05a0cbb5879de6a32143e7a6943d39134c905eac002948a3224aa60a094c74d1_ppc64le", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:69c1d087204ee0458a6a00fdef6ca990360d69eb8efba5959dedbd3c525b72f5_amd64", "8Base-RHOSE-4.12:openshift4/ptp-must-gather-rhel8@sha256:8cc6ec9b3b2065f16211ad9d897443307abfa3da251d00806effe541f5ac9e53_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23526" }, { "category": "external", "summary": "RHBZ#2154196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154196" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23526" }, { "category": "external", "summary": "https://github.com/helm/helm/commit/bafafa8bb1b571b61d7a9528da8d40c307dade3d", "url": "https://github.com/helm/helm/commit/bafafa8bb1b571b61d7a9528da8d40c307dade3d" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-67fx-wx78-jx33", "url": "https://github.com/helm/helm/security/advisories/GHSA-67fx-wx78-jx33" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-04-11T07:54:54+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:0ee39e2f6f3c0dc2bc65b385a3e0d66d53d6ea7c76764b5993d31e26e3cf9544_amd64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:19684945a72c05cfdea9dee22ac550cb0ef2041c4c2b0799374c6ba82dcf1f12_arm64", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:a8bd75e0ad02330565593ad62f907786693d71fe122932311ce464c887811de0_ppc64le", "8Base-RHOSE-4.12:openshift4/metallb-rhel8-operator@sha256:c2bf337a1e49b2100fee5e2b815563ea656f5d3a33f2fc403a5ac25bc3b4be4f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: Denial of service through schema file" } ] }
WID-SEC-W-2024-1591
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1591 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json" }, { "category": "self", "summary": "WID-SEC-2024-1591 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591" }, { "category": "external", "summary": "Juniper Patchday July 2024 vom 2024-07-10", "url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D" } ], "source_lang": "en-US", "title": "Juniper JUNOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-11T23:00:00.000+00:00", "generator": { "date": "2024-11-12T09:31:28.569+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1591", "initial_release_date": "2024-07-10T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "2", "summary": "URL Kodierung angepasst" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Juniper JUNOS", "product": { "name": "Juniper JUNOS", "product_id": "T036093", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:-" } } } ], "category": "vendor", "name": "Juniper" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-20001", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2006-20001" }, { "cve": "CVE-2007-5846", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2007-5846" }, { "cve": "CVE-2008-6123", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2008-6123" }, { "cve": "CVE-2011-1473", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2011-1473" }, { "cve": "CVE-2011-5094", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2011-5094" }, { "cve": "CVE-2012-6151", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2012-6151" }, { "cve": "CVE-2014-10064", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-10064" }, { "cve": "CVE-2014-2285", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-2285" }, { "cve": "CVE-2014-2310", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-2310" }, { "cve": "CVE-2014-3565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-3565" }, { "cve": "CVE-2014-7191", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-7191" }, { "cve": "CVE-2014-8882", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-8882" }, { "cve": "CVE-2015-5621", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-5621" }, { "cve": "CVE-2015-8100", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-8100" }, { "cve": "CVE-2015-9262", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-9262" }, { "cve": "CVE-2016-1000232", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-1000232" }, { "cve": "CVE-2016-10540", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-10540" }, { "cve": "CVE-2016-4658", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-4658" }, { "cve": "CVE-2017-1000048", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2017-1000048" }, { "cve": "CVE-2017-15010", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2017-15010" }, { "cve": "CVE-2018-18065", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-18065" }, { "cve": "CVE-2018-20834", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-20834" }, { "cve": "CVE-2018-3737", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-3737" }, { "cve": "CVE-2018-7408", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-7408" }, { "cve": "CVE-2019-10081", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10081" }, { "cve": "CVE-2019-10082", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10082" }, { "cve": "CVE-2019-10092", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10092" }, { "cve": "CVE-2019-10097", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10097" }, { "cve": "CVE-2019-10098", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10098" }, { "cve": "CVE-2019-11719", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11719" }, { "cve": "CVE-2019-11727", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11727" }, { "cve": "CVE-2019-11756", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11756" }, { "cve": "CVE-2019-16775", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16775" }, { "cve": "CVE-2019-16776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16776" }, { "cve": "CVE-2019-16777", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16777" }, { "cve": "CVE-2019-17006", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17006" }, { "cve": "CVE-2019-17023", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17023" }, { "cve": "CVE-2019-17567", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17567" }, { "cve": "CVE-2019-20149", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-20149" }, { "cve": "CVE-2019-20892", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-20892" }, { "cve": "CVE-2019-9517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-9517" }, { "cve": "CVE-2020-11668", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11668" }, { "cve": "CVE-2020-11984", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11984" }, { "cve": "CVE-2020-11993", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11993" }, { "cve": "CVE-2020-12362", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12362" }, { "cve": "CVE-2020-12400", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12400" }, { "cve": "CVE-2020-12401", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12401" }, { "cve": "CVE-2020-12402", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12402" }, { "cve": "CVE-2020-12403", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12403" }, { "cve": "CVE-2020-13938", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-13938" }, { "cve": "CVE-2020-13950", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-13950" }, { "cve": "CVE-2020-14145", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-14145" }, { "cve": "CVE-2020-15861", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-15861" }, { "cve": "CVE-2020-15862", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-15862" }, { "cve": "CVE-2020-1927", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-1927" }, { "cve": "CVE-2020-1934", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-1934" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28502", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-28502" }, { "cve": "CVE-2020-35452", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-35452" }, { "cve": "CVE-2020-36049", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-36049" }, { "cve": "CVE-2020-6829", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-6829" }, { "cve": "CVE-2020-7660", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7660" }, { "cve": "CVE-2020-7754", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7754" }, { "cve": "CVE-2020-7774", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7774" }, { "cve": "CVE-2020-8648", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-8648" }, { "cve": "CVE-2020-9490", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-9490" }, { "cve": "CVE-2021-22543", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-22543" }, { "cve": "CVE-2021-2342", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2342" }, { "cve": "CVE-2021-23440", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-23440" }, { "cve": "CVE-2021-2356", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2356" }, { "cve": "CVE-2021-2372", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2372" }, { "cve": "CVE-2021-2385", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2385" }, { "cve": "CVE-2021-2389", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2389" }, { "cve": "CVE-2021-2390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2390" }, { "cve": "CVE-2021-25745", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25745" }, { "cve": "CVE-2021-25746", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25746" }, { "cve": "CVE-2021-25748", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25748" }, { "cve": "CVE-2021-26690", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-26690" }, { "cve": "CVE-2021-26691", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-26691" }, { "cve": "CVE-2021-27290", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-27290" }, { "cve": "CVE-2021-29469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-29469" }, { "cve": "CVE-2021-30641", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-30641" }, { "cve": "CVE-2021-31535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-31535" }, { "cve": "CVE-2021-31618", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-31618" }, { "cve": "CVE-2021-3177", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3177" }, { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-33033", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33033" }, { "cve": "CVE-2021-33034", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33034" }, { "cve": "CVE-2021-33193", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33193" }, { "cve": "CVE-2021-3347", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3347" }, { "cve": "CVE-2021-33909", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33909" }, { "cve": "CVE-2021-34798", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-34798" }, { "cve": "CVE-2021-35604", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-35604" }, { "cve": "CVE-2021-35624", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-35624" }, { "cve": "CVE-2021-36160", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-36160" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-39275", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-39275" }, { "cve": "CVE-2021-40438", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-40438" }, { "cve": "CVE-2021-41524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-41524" }, { "cve": "CVE-2021-41773", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-41773" }, { "cve": "CVE-2021-42013", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-42013" }, { "cve": "CVE-2021-43527", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-43527" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44225", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44225" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-44906", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44906" }, { "cve": "CVE-2022-21245", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21245" }, { "cve": "CVE-2022-21270", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21270" }, { "cve": "CVE-2022-21303", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21303" }, { "cve": "CVE-2022-21304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21304" }, { "cve": "CVE-2022-21344", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21344" }, { "cve": "CVE-2022-21367", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21367" }, { "cve": "CVE-2022-21417", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21417" }, { "cve": "CVE-2022-21427", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21427" }, { "cve": "CVE-2022-21444", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21444" }, { "cve": "CVE-2022-21451", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21451" }, { "cve": "CVE-2022-21454", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21454" }, { "cve": "CVE-2022-21460", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21460" }, { "cve": "CVE-2022-21589", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21589" }, { "cve": "CVE-2022-21592", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21592" }, { "cve": "CVE-2022-21595", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21595" }, { "cve": "CVE-2022-21608", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21608" }, { "cve": "CVE-2022-21617", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21617" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23524" }, { "cve": "CVE-2022-23525", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23525" }, { "cve": "CVE-2022-23526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23526" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-2526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-2526" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26377", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-26377" }, { "cve": "CVE-2022-28330", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28330" }, { "cve": "CVE-2022-28614", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28614" }, { "cve": "CVE-2022-28615", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28615" }, { "cve": "CVE-2022-29167", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-29167" }, { "cve": "CVE-2022-29404", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-29404" }, { "cve": "CVE-2022-30522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-30522" }, { "cve": "CVE-2022-30556", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-30556" }, { "cve": "CVE-2022-31813", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-31813" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-41741", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-41741" }, { "cve": "CVE-2022-41742", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-41742" }, { "cve": "CVE-2022-4203", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4203" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-46663", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-46663" }, { "cve": "CVE-2022-4886", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4886" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0216", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0216" }, { "cve": "CVE-2023-0217", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0217" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0401", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0401" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0767", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0767" }, { "cve": "CVE-2023-1255", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-1255" }, { "cve": "CVE-2023-2002", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2002" }, { "cve": "CVE-2023-20593", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-20593" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21840", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21840" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21912", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21912" }, { "cve": "CVE-2023-21963", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21963" }, { "cve": "CVE-2023-21980", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21980" }, { "cve": "CVE-2023-22025", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22025" }, { "cve": "CVE-2023-22067", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22067" }, { "cve": "CVE-2023-22081", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22081" }, { "cve": "CVE-2023-22652", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22652" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-25153", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25153" }, { "cve": "CVE-2023-25173", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25173" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-2700", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2700" }, { "cve": "CVE-2023-27522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-27522" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-2975", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2975" }, { "cve": "CVE-2023-30079", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-30079" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-3090", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3090" }, { "cve": "CVE-2023-32067", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32067" }, { "cve": "CVE-2023-32360", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32360" }, { "cve": "CVE-2023-32435", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32435" }, { "cve": "CVE-2023-32439", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32439" }, { "cve": "CVE-2023-32732", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32732" }, { "cve": "CVE-2023-3341", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3341" }, { "cve": "CVE-2023-3390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3390" }, { "cve": "CVE-2023-33953", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-33953" }, { "cve": "CVE-2023-34058", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34058" }, { "cve": "CVE-2023-34059", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34059" }, { "cve": "CVE-2023-3446", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3446" }, { "cve": "CVE-2023-34969", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34969" }, { "cve": "CVE-2023-35001", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-35001" }, { "cve": "CVE-2023-35788", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-35788" }, { "cve": "CVE-2023-3611", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3611" }, { "cve": "CVE-2023-37450", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-37450" }, { "cve": "CVE-2023-3776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3776" }, { "cve": "CVE-2023-3817", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3817" }, { "cve": "CVE-2023-4004", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4004" }, { "cve": "CVE-2023-4206", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4206" }, { "cve": "CVE-2023-4207", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4207" }, { "cve": "CVE-2023-4208", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4208" }, { "cve": "CVE-2023-42753", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-42753" }, { "cve": "CVE-2023-4785", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4785" }, { "cve": "CVE-2023-4807", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4807" }, { "cve": "CVE-2023-4863", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4863" }, { "cve": "CVE-2023-5043", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5043" }, { "cve": "CVE-2023-5129", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5129" }, { "cve": "CVE-2023-5363", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5363" }, { "cve": "CVE-2024-20918", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20918" }, { "cve": "CVE-2024-20919", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20919" }, { "cve": "CVE-2024-20921", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20921" }, { "cve": "CVE-2024-20926", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20926" }, { "cve": "CVE-2024-20932", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20932" }, { "cve": "CVE-2024-20945", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20945" }, { "cve": "CVE-2024-20952", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20952" }, { "cve": "CVE-2024-39511", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39511" }, { "cve": "CVE-2024-39512", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39512" }, { "cve": "CVE-2024-39513", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39513" }, { "cve": "CVE-2024-39514", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39514" }, { "cve": "CVE-2024-39517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39517" }, { "cve": "CVE-2024-39518", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39518" }, { "cve": "CVE-2024-39519", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39519" }, { "cve": "CVE-2024-39520", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39520" }, { "cve": "CVE-2024-39521", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39521" }, { "cve": "CVE-2024-39522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39522" }, { "cve": "CVE-2024-39523", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39523" }, { "cve": "CVE-2024-39524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39524" }, { "cve": "CVE-2024-39528", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39528" }, { "cve": "CVE-2024-39529", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39529" }, { "cve": "CVE-2024-39530", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39530" }, { "cve": "CVE-2024-39531", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39531" }, { "cve": "CVE-2024-39532", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39532" }, { "cve": "CVE-2024-39533", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39533" }, { "cve": "CVE-2024-39535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39535" }, { "cve": "CVE-2024-39536", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39536" }, { "cve": "CVE-2024-39537", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39537" }, { "cve": "CVE-2024-39538", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39538" }, { "cve": "CVE-2024-39539", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39539" }, { "cve": "CVE-2024-39540", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39540" }, { "cve": "CVE-2024-39541", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39541" }, { "cve": "CVE-2024-39542", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39542" }, { "cve": "CVE-2024-39543", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39543" }, { "cve": "CVE-2024-39545", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39545" }, { "cve": "CVE-2024-39546", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39546" }, { "cve": "CVE-2024-39548", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39548" }, { "cve": "CVE-2024-39549", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39549" }, { "cve": "CVE-2024-39550", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39550" }, { "cve": "CVE-2024-39551", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39551" }, { "cve": "CVE-2024-39553", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39553" }, { "cve": "CVE-2024-39554", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39554" }, { "cve": "CVE-2024-39555", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39555" }, { "cve": "CVE-2024-39556", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39556" }, { "cve": "CVE-2024-39557", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39557" }, { "cve": "CVE-2024-39558", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39558" }, { "cve": "CVE-2024-39559", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39559" }, { "cve": "CVE-2024-39560", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39560" }, { "cve": "CVE-2024-39561", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39561" }, { "cve": "CVE-2024-39565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39565" } ] }
WID-SEC-W-2023-0912
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0912 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0912.json" }, { "category": "self", "summary": "WID-SEC-2023-0912 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0912" }, { "category": "external", "summary": "RedHat Security Advisory vom 2023-04-10", "url": "https://access.redhat.com/errata/RHSA-2023:1646" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1326 vom 2023-05-18", "url": "https://access.redhat.com/errata/RHSA-2023:1326" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30", "url": "https://access.redhat.com/errata/RHSA-2023:5006" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2024-01-01T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:48:26.680+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0912", "initial_release_date": "2023-04-10T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-01T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift \u003c 4.12.11", "product": { "name": "Red Hat OpenShift \u003c 4.12.11", "product_id": "T027157", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.12.11" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.13", "product": { "name": "Red Hat OpenShift Container Platform 4.13", "product_id": "T027760", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform_4.13" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform \u003c 4.14.0", "product": { "name": "Red Hat OpenShift Container Platform \u003c 4.14.0", "product_id": "T031839", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.0" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23526", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der \"Helm\" Komponente. Dabei handelt es sich um unkontrollierten Resourcenverbrauch beim Parsen von bestimmten Zeichenketten und Nullzeiger Dereferenzierungen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T031839", "T027760" ] }, "release_date": "2023-04-10T22:00:00.000+00:00", "title": "CVE-2022-23526" }, { "cve": "CVE-2022-23525", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der \"Helm\" Komponente. Dabei handelt es sich um unkontrollierten Resourcenverbrauch beim Parsen von bestimmten Zeichenketten und Nullzeiger Dereferenzierungen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T031839", "T027760" ] }, "release_date": "2023-04-10T22:00:00.000+00:00", "title": "CVE-2022-23525" }, { "cve": "CVE-2022-23524", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der \"Helm\" Komponente. Dabei handelt es sich um unkontrollierten Resourcenverbrauch beim Parsen von bestimmten Zeichenketten und Nullzeiger Dereferenzierungen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T031839", "T027760" ] }, "release_date": "2023-04-10T22:00:00.000+00:00", "title": "CVE-2022-23524" } ] }
wid-sec-w-2024-1591
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1591 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json" }, { "category": "self", "summary": "WID-SEC-2024-1591 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591" }, { "category": "external", "summary": "Juniper Patchday July 2024 vom 2024-07-10", "url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D" } ], "source_lang": "en-US", "title": "Juniper JUNOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-11T23:00:00.000+00:00", "generator": { "date": "2024-11-12T09:31:28.569+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1591", "initial_release_date": "2024-07-10T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "2", "summary": "URL Kodierung angepasst" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Juniper JUNOS", "product": { "name": "Juniper JUNOS", "product_id": "T036093", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:-" } } } ], "category": "vendor", "name": "Juniper" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-20001", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2006-20001" }, { "cve": "CVE-2007-5846", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2007-5846" }, { "cve": "CVE-2008-6123", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2008-6123" }, { "cve": "CVE-2011-1473", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2011-1473" }, { "cve": "CVE-2011-5094", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2011-5094" }, { "cve": "CVE-2012-6151", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2012-6151" }, { "cve": "CVE-2014-10064", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-10064" }, { "cve": "CVE-2014-2285", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-2285" }, { "cve": "CVE-2014-2310", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-2310" }, { "cve": "CVE-2014-3565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-3565" }, { "cve": "CVE-2014-7191", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-7191" }, { "cve": "CVE-2014-8882", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-8882" }, { "cve": "CVE-2015-5621", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-5621" }, { "cve": "CVE-2015-8100", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-8100" }, { "cve": "CVE-2015-9262", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-9262" }, { "cve": "CVE-2016-1000232", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-1000232" }, { "cve": "CVE-2016-10540", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-10540" }, { "cve": "CVE-2016-4658", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-4658" }, { "cve": "CVE-2017-1000048", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2017-1000048" }, { "cve": "CVE-2017-15010", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2017-15010" }, { "cve": "CVE-2018-18065", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-18065" }, { "cve": "CVE-2018-20834", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-20834" }, { "cve": "CVE-2018-3737", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-3737" }, { "cve": "CVE-2018-7408", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-7408" }, { "cve": "CVE-2019-10081", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10081" }, { "cve": "CVE-2019-10082", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10082" }, { "cve": "CVE-2019-10092", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10092" }, { "cve": "CVE-2019-10097", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10097" }, { "cve": "CVE-2019-10098", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10098" }, { "cve": "CVE-2019-11719", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11719" }, { "cve": "CVE-2019-11727", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11727" }, { "cve": "CVE-2019-11756", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11756" }, { "cve": "CVE-2019-16775", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16775" }, { "cve": "CVE-2019-16776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16776" }, { "cve": "CVE-2019-16777", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16777" }, { "cve": "CVE-2019-17006", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17006" }, { "cve": "CVE-2019-17023", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17023" }, { "cve": "CVE-2019-17567", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17567" }, { "cve": "CVE-2019-20149", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-20149" }, { "cve": "CVE-2019-20892", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-20892" }, { "cve": "CVE-2019-9517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-9517" }, { "cve": "CVE-2020-11668", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11668" }, { "cve": "CVE-2020-11984", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11984" }, { "cve": "CVE-2020-11993", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11993" }, { "cve": "CVE-2020-12362", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12362" }, { "cve": "CVE-2020-12400", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12400" }, { "cve": "CVE-2020-12401", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12401" }, { "cve": "CVE-2020-12402", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12402" }, { "cve": "CVE-2020-12403", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12403" }, { "cve": "CVE-2020-13938", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-13938" }, { "cve": "CVE-2020-13950", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-13950" }, { "cve": "CVE-2020-14145", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-14145" }, { "cve": "CVE-2020-15861", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-15861" }, { "cve": "CVE-2020-15862", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-15862" }, { "cve": "CVE-2020-1927", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-1927" }, { "cve": "CVE-2020-1934", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-1934" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28502", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-28502" }, { "cve": "CVE-2020-35452", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-35452" }, { "cve": "CVE-2020-36049", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-36049" }, { "cve": "CVE-2020-6829", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-6829" }, { "cve": "CVE-2020-7660", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7660" }, { "cve": "CVE-2020-7754", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7754" }, { "cve": "CVE-2020-7774", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7774" }, { "cve": "CVE-2020-8648", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-8648" }, { "cve": "CVE-2020-9490", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-9490" }, { "cve": "CVE-2021-22543", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-22543" }, { "cve": "CVE-2021-2342", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2342" }, { "cve": "CVE-2021-23440", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-23440" }, { "cve": "CVE-2021-2356", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2356" }, { "cve": "CVE-2021-2372", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2372" }, { "cve": "CVE-2021-2385", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2385" }, { "cve": "CVE-2021-2389", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2389" }, { "cve": "CVE-2021-2390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2390" }, { "cve": "CVE-2021-25745", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25745" }, { "cve": "CVE-2021-25746", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25746" }, { "cve": "CVE-2021-25748", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25748" }, { "cve": "CVE-2021-26690", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-26690" }, { "cve": "CVE-2021-26691", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-26691" }, { "cve": "CVE-2021-27290", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-27290" }, { "cve": "CVE-2021-29469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-29469" }, { "cve": "CVE-2021-30641", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-30641" }, { "cve": "CVE-2021-31535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-31535" }, { "cve": "CVE-2021-31618", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-31618" }, { "cve": "CVE-2021-3177", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3177" }, { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-33033", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33033" }, { "cve": "CVE-2021-33034", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33034" }, { "cve": "CVE-2021-33193", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33193" }, { "cve": "CVE-2021-3347", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3347" }, { "cve": "CVE-2021-33909", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33909" }, { "cve": "CVE-2021-34798", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-34798" }, { "cve": "CVE-2021-35604", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-35604" }, { "cve": "CVE-2021-35624", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-35624" }, { "cve": "CVE-2021-36160", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-36160" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-39275", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-39275" }, { "cve": "CVE-2021-40438", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-40438" }, { "cve": "CVE-2021-41524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-41524" }, { "cve": "CVE-2021-41773", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-41773" }, { "cve": "CVE-2021-42013", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-42013" }, { "cve": "CVE-2021-43527", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-43527" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44225", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44225" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-44906", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44906" }, { "cve": "CVE-2022-21245", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21245" }, { "cve": "CVE-2022-21270", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21270" }, { "cve": "CVE-2022-21303", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21303" }, { "cve": "CVE-2022-21304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21304" }, { "cve": "CVE-2022-21344", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21344" }, { "cve": "CVE-2022-21367", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21367" }, { "cve": "CVE-2022-21417", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21417" }, { "cve": "CVE-2022-21427", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21427" }, { "cve": "CVE-2022-21444", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21444" }, { "cve": "CVE-2022-21451", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21451" }, { "cve": "CVE-2022-21454", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21454" }, { "cve": "CVE-2022-21460", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21460" }, { "cve": "CVE-2022-21589", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21589" }, { "cve": "CVE-2022-21592", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21592" }, { "cve": "CVE-2022-21595", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21595" }, { "cve": "CVE-2022-21608", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21608" }, { "cve": "CVE-2022-21617", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21617" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23524" }, { "cve": "CVE-2022-23525", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23525" }, { "cve": "CVE-2022-23526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23526" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-2526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-2526" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26377", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-26377" }, { "cve": "CVE-2022-28330", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28330" }, { "cve": "CVE-2022-28614", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28614" }, { "cve": "CVE-2022-28615", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28615" }, { "cve": "CVE-2022-29167", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-29167" }, { "cve": "CVE-2022-29404", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-29404" }, { "cve": "CVE-2022-30522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-30522" }, { "cve": "CVE-2022-30556", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-30556" }, { "cve": "CVE-2022-31813", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-31813" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-41741", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-41741" }, { "cve": "CVE-2022-41742", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-41742" }, { "cve": "CVE-2022-4203", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4203" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-46663", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-46663" }, { "cve": "CVE-2022-4886", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4886" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0216", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0216" }, { "cve": "CVE-2023-0217", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0217" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0401", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0401" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0767", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0767" }, { "cve": "CVE-2023-1255", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-1255" }, { "cve": "CVE-2023-2002", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2002" }, { "cve": "CVE-2023-20593", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-20593" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21840", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21840" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21912", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21912" }, { "cve": "CVE-2023-21963", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21963" }, { "cve": "CVE-2023-21980", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21980" }, { "cve": "CVE-2023-22025", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22025" }, { "cve": "CVE-2023-22067", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22067" }, { "cve": "CVE-2023-22081", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22081" }, { "cve": "CVE-2023-22652", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22652" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-25153", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25153" }, { "cve": "CVE-2023-25173", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25173" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-2700", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2700" }, { "cve": "CVE-2023-27522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-27522" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-2975", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2975" }, { "cve": "CVE-2023-30079", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-30079" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-3090", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3090" }, { "cve": "CVE-2023-32067", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32067" }, { "cve": "CVE-2023-32360", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32360" }, { "cve": "CVE-2023-32435", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32435" }, { "cve": "CVE-2023-32439", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32439" }, { "cve": "CVE-2023-32732", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32732" }, { "cve": "CVE-2023-3341", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3341" }, { "cve": "CVE-2023-3390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3390" }, { "cve": "CVE-2023-33953", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-33953" }, { "cve": "CVE-2023-34058", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34058" }, { "cve": "CVE-2023-34059", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34059" }, { "cve": "CVE-2023-3446", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3446" }, { "cve": "CVE-2023-34969", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34969" }, { "cve": "CVE-2023-35001", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-35001" }, { "cve": "CVE-2023-35788", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-35788" }, { "cve": "CVE-2023-3611", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3611" }, { "cve": "CVE-2023-37450", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-37450" }, { "cve": "CVE-2023-3776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3776" }, { "cve": "CVE-2023-3817", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3817" }, { "cve": "CVE-2023-4004", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4004" }, { "cve": "CVE-2023-4206", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4206" }, { "cve": "CVE-2023-4207", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4207" }, { "cve": "CVE-2023-4208", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4208" }, { "cve": "CVE-2023-42753", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-42753" }, { "cve": "CVE-2023-4785", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4785" }, { "cve": "CVE-2023-4807", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4807" }, { "cve": "CVE-2023-4863", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4863" }, { "cve": "CVE-2023-5043", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5043" }, { "cve": "CVE-2023-5129", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5129" }, { "cve": "CVE-2023-5363", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5363" }, { "cve": "CVE-2024-20918", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20918" }, { "cve": "CVE-2024-20919", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20919" }, { "cve": "CVE-2024-20921", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20921" }, { "cve": "CVE-2024-20926", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20926" }, { "cve": "CVE-2024-20932", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20932" }, { "cve": "CVE-2024-20945", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20945" }, { "cve": "CVE-2024-20952", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20952" }, { "cve": "CVE-2024-39511", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39511" }, { "cve": "CVE-2024-39512", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39512" }, { "cve": "CVE-2024-39513", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39513" }, { "cve": "CVE-2024-39514", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39514" }, { "cve": "CVE-2024-39517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39517" }, { "cve": "CVE-2024-39518", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39518" }, { "cve": "CVE-2024-39519", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39519" }, { "cve": "CVE-2024-39520", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39520" }, { "cve": "CVE-2024-39521", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39521" }, { "cve": "CVE-2024-39522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39522" }, { "cve": "CVE-2024-39523", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39523" }, { "cve": "CVE-2024-39524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39524" }, { "cve": "CVE-2024-39528", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39528" }, { "cve": "CVE-2024-39529", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39529" }, { "cve": "CVE-2024-39530", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39530" }, { "cve": "CVE-2024-39531", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39531" }, { "cve": "CVE-2024-39532", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39532" }, { "cve": "CVE-2024-39533", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39533" }, { "cve": "CVE-2024-39535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39535" }, { "cve": "CVE-2024-39536", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39536" }, { "cve": "CVE-2024-39537", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39537" }, { "cve": "CVE-2024-39538", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39538" }, { "cve": "CVE-2024-39539", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39539" }, { "cve": "CVE-2024-39540", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39540" }, { "cve": "CVE-2024-39541", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39541" }, { "cve": "CVE-2024-39542", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39542" }, { "cve": "CVE-2024-39543", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39543" }, { "cve": "CVE-2024-39545", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39545" }, { "cve": "CVE-2024-39546", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39546" }, { "cve": "CVE-2024-39548", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39548" }, { "cve": "CVE-2024-39549", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39549" }, { "cve": "CVE-2024-39550", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39550" }, { "cve": "CVE-2024-39551", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39551" }, { "cve": "CVE-2024-39553", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39553" }, { "cve": "CVE-2024-39554", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39554" }, { "cve": "CVE-2024-39555", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39555" }, { "cve": "CVE-2024-39556", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39556" }, { "cve": "CVE-2024-39557", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39557" }, { "cve": "CVE-2024-39558", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39558" }, { "cve": "CVE-2024-39559", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39559" }, { "cve": "CVE-2024-39560", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39560" }, { "cve": "CVE-2024-39561", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39561" }, { "cve": "CVE-2024-39565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39565" } ] }
wid-sec-w-2023-0912
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0912 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0912.json" }, { "category": "self", "summary": "WID-SEC-2023-0912 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0912" }, { "category": "external", "summary": "RedHat Security Advisory vom 2023-04-10", "url": "https://access.redhat.com/errata/RHSA-2023:1646" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1326 vom 2023-05-18", "url": "https://access.redhat.com/errata/RHSA-2023:1326" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30", "url": "https://access.redhat.com/errata/RHSA-2023:5006" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2024-01-01T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:48:26.680+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0912", "initial_release_date": "2023-04-10T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-01T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift \u003c 4.12.11", "product": { "name": "Red Hat OpenShift \u003c 4.12.11", "product_id": "T027157", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.12.11" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.13", "product": { "name": "Red Hat OpenShift Container Platform 4.13", "product_id": "T027760", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform_4.13" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform \u003c 4.14.0", "product": { "name": "Red Hat OpenShift Container Platform \u003c 4.14.0", "product_id": "T031839", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.0" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23526", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der \"Helm\" Komponente. Dabei handelt es sich um unkontrollierten Resourcenverbrauch beim Parsen von bestimmten Zeichenketten und Nullzeiger Dereferenzierungen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T031839", "T027760" ] }, "release_date": "2023-04-10T22:00:00.000+00:00", "title": "CVE-2022-23526" }, { "cve": "CVE-2022-23525", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der \"Helm\" Komponente. Dabei handelt es sich um unkontrollierten Resourcenverbrauch beim Parsen von bestimmten Zeichenketten und Nullzeiger Dereferenzierungen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T031839", "T027760" ] }, "release_date": "2023-04-10T22:00:00.000+00:00", "title": "CVE-2022-23525" }, { "cve": "CVE-2022-23524", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der \"Helm\" Komponente. Dabei handelt es sich um unkontrollierten Resourcenverbrauch beim Parsen von bestimmten Zeichenketten und Nullzeiger Dereferenzierungen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T031839", "T027760" ] }, "release_date": "2023-04-10T22:00:00.000+00:00", "title": "CVE-2022-23524" } ] }
fkie_cve-2022-23524
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*", "matchCriteriaId": "135AAD77-267A-4119-877F-60195A002775", "versionEndExcluding": "3.10.3", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Helm is a tool for managing Charts, pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to Uncontrolled Resource Consumption, resulting in Denial of Service. Input to functions in the _strvals_ package can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics. This issue has been patched in 3.10.3. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions." }, { "lang": "es", "value": "Helm es una herramienta para gestionar gr\u00e1ficos, recursos de Kubernetes preconfigurados. Las versiones anteriores a la 3.10.3 est\u00e1n sujetas a un consumo incontrolado de recursos, lo que resulta en una Denegaci\u00f3n de Servicio (DoS). La entrada a funciones en _strvals_ package puede provocar un desbordamiento de la pila. En Go, no se puede recuperar un desbordamiento de pila. Las aplicaciones que usan funciones de _strvals_ package en Helm SDK pueden sufrir un ataque de Denegaci\u00f3n de Servicio (DoS) cuando usan este paquete y entran en p\u00e1nico. Este problema se solucion\u00f3 en 3.10.3. Los usuarios del SDK pueden validar que las cadenas proporcionadas por los usuarios no creen matrices grandes que provoquen un uso significativo de la memoria antes de pasarlas a las _strvals_ functions." } ], "id": "CVE-2022-23524", "lastModified": "2024-11-21T06:48:44.807", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-15T19:15:16.863", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-6rx9-889q-vv2r
Vulnerability from github
Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the strvals package that can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the strvals package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.
Impact
The strvals package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like --set
, --set-string
, and others that enable the user to pass in strings that are merged into the values. The strvals package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing a stack overflow.
Applications that use the strvals package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.
The Helm Client will panic with input to --set
, --set-string
, and other value setting flags that causes a stack overflow. Helm is not a long running service so the panic will not affect future uses of the Helm client.
Patches
This issue has been resolved in 3.10.3.
Workarounds
SDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the strvals functions.
For more information
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 3.10.2" }, "package": { "ecosystem": "Go", "name": "helm.sh/helm/v3" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.10.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-23524" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": true, "github_reviewed_at": "2022-12-14T21:36:56Z", "nvd_published_at": "2022-12-15T19:15:00Z", "severity": "MODERATE" }, "details": "Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the _strvals_ package that can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.\n\n### Impact\n\nThe _strvals_ package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like `--set`, `--set-string`, and others that enable the user to pass in strings that are merged into the values. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing a stack overflow.\n\nApplications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes a stack overflow. Helm is not a long running service so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis issue has been resolved in 3.10.3. \n\n### Workarounds\n\nSDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.\n\n### For more information\n\nHelm\u0027s security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF.", "id": "GHSA-6rx9-889q-vv2r", "modified": "2022-12-20T19:06:38Z", "published": "2022-12-14T21:36:56Z", "references": [ { "type": "WEB", "url": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23524" }, { "type": "WEB", "url": "https://github.com/helm/helm/commit/3636f6824757ff734cb265b8770efe48c1fb3737" }, { "type": "PACKAGE", "url": "https://github.com/helm/helm" }, { "type": "WEB", "url": "https://pkg.go.dev/vuln/GO-2022-1167" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ], "summary": "Helm vulnerable to denial of service through string value parsing" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.